, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)=@generic={0x0, "39e2973127f5e3a1a5bfbb1ecaa5a46d4b5826bf3e29477aa83b930341931a1f25ab76245a960d63ad1c467c83c9e842abeb59bd851ff437263884dd641efc7cddeb22ac78ffe364d71d64ba2419fa41dcfd4ecc737cbc4d7712913083867f23221c0d0caea62d07f72e8ec980a45d10c57b55425bc426b453d4038d7526"}, 0x80, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:53:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001940)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64fe1cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4000, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) 00:53:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@decompose='decompose'}]}) 00:53:28 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000080), 0xe) close(r0) [ 1025.361951][T31711] device nr0 entered promiscuous mode 00:53:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b00)=[{{0x0, 0x141, &(0x7f0000000200)=[{&(0x7f0000000380)=""/217, 0xd9}], 0x1, 0x0, 0x4f}}], 0x1, 0x0, 0x0) 00:53:28 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000080), 0xe) close(r0) 00:53:28 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)=0xeaba) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001140), 0x1000) 00:53:28 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000080), 0xe) close(r0) 00:53:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b00)=[{{0x0, 0x141, &(0x7f0000000200)=[{&(0x7f0000000380)=""/217, 0xd9}], 0x1, 0x0, 0x4f}}], 0x1, 0x0, 0x0) [ 1025.815606][T31737] hfsplus: unable to find HFS+ superblock 00:53:29 executing program 5: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:53:29 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000080), 0xe) close(r0) 00:53:29 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)=0xeaba) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001140), 0x1000) 00:53:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b00)=[{{0x0, 0x141, &(0x7f0000000200)=[{&(0x7f0000000380)=""/217, 0xd9}], 0x1, 0x0, 0x4f}}], 0x1, 0x0, 0x0) 00:53:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001940)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64fe1cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4000, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) 00:53:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@decompose='decompose'}]}) 00:53:29 executing program 1: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:53:29 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)=0xeaba) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001140), 0x1000) 00:53:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002b00)=[{{0x0, 0x141, &(0x7f0000000200)=[{&(0x7f0000000380)=""/217, 0xd9}], 0x1, 0x0, 0x4f}}], 0x1, 0x0, 0x0) [ 1026.715392][T31771] device nr0 entered promiscuous mode [ 1027.001377][T31778] hfsplus: unable to find HFS+ superblock 00:53:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r1 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x7e, 0x0, 0x10001}) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') r2 = memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x881806) read(r2, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000480)='t\bnu\x00\x00\x00\x00\x00\x00c>\x00\x8c\x00', 0x7, 0x0) add_key(&(0x7f0000000440)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 00:53:30 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)=0xeaba) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000001140), 0x1000) 00:53:30 executing program 1: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:53:30 executing program 5: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:53:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001940)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64fe1cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4000, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) 00:53:30 executing program 4: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001fe8)) socket(0x2c, 0x0, 0x0) [ 1027.887857][T31802] device nr0 entered promiscuous mode 00:53:31 executing program 4: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001fe8)) socket(0x2c, 0x0, 0x0) 00:53:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@decompose='decompose'}]}) 00:53:31 executing program 1: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:53:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:31 executing program 4: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001fe8)) socket(0x2c, 0x0, 0x0) [ 1028.277761][T31818] hfsplus: unable to find HFS+ superblock 00:53:31 executing program 4: capset(&(0x7f0000001000)={0x19980330}, &(0x7f0000001fe8)) socket(0x2c, 0x0, 0x0) 00:53:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:31 executing program 5: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20002, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:53:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, 0x0, 0x0) 00:53:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @local}, {0x0, @remote}, 0xdf604086f0490e29, {}, 'nr0\x00'}) 00:53:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x84) getsockopt$bt_hci(r0, 0x84, 0x74, &(0x7f0000001080)=""/4096, &(0x7f0000000040)=0x4f3) 00:53:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x3}) 00:53:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:53:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, 0x0, 0x0) 00:53:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x2, 0x80200) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) write$P9_RWALK(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="300000f06f02040300100000000002000000000000004000000000050000000000000003"], 0x24) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x135) getsockopt$packet_int(r0, 0x107, 0x1d, &(0x7f0000000140), &(0x7f00000003c0)=0x4) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) write$binfmt_aout(r1, &(0x7f0000000400)={{0x107, 0x9, 0x1, 0x1f, 0x134, 0x5, 0x305, 0x7ff}, "03e87c1d12e350a7a2d5e646bdd115314fb53ea8ebb8db2eafdd458ba95fcd22b4aa2b2c7adf43a7969346ea6064d27faa3c8e63cbe549aacff2ea3e926f598a49212f9d4998686e65c7c07b5f29f07f82ced7ec027ed04558b7de32726c767299d5df9bf12be59a27aeb7fb555b93b7769954b792b2063f80c3db7149d6a97f13a724482495ddf53049867463e2d56530420faecf1ad71a6f959ba479af6476d1526def16959b5cb3c31ad5768758867214c54d34b8bfd8977c8ae762f592e8810b2fda79696ea356f7208d87ac70f8a2cc928b62fd6e66d5e6a56b7774a17ec9fee755d8de6f86b6", [[]]}, 0x209) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, 0x0) read$rfkill(r2, &(0x7f0000000300), 0xfffffc99) geteuid() [ 1040.630468][T31875] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 00:53:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x3}) 00:53:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:43 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x84) getsockopt$bt_hci(r0, 0x84, 0x74, &(0x7f0000001080)=""/4096, &(0x7f0000000040)=0x4f3) 00:53:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, 0x0, 0x0) 00:53:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @local}, {0x0, @remote}, 0xdf604086f0490e29, {}, 'nr0\x00'}) 00:53:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x3}) 00:53:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x8c', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 00:53:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x84) getsockopt$bt_hci(r0, 0x84, 0x74, &(0x7f0000001080)=""/4096, &(0x7f0000000040)=0x4f3) 00:53:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, 0x0, 0x0) [ 1041.000752][T31900] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 00:53:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000080)) [ 1041.108790][T31899] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 00:53:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x3}) 00:53:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff000}, {0x80000006}]}, 0x10) 00:53:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x3}) 00:53:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @local}, {0x0, @remote}, 0xdf604086f0490e29, {}, 'nr0\x00'}) 00:53:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000080)) 00:53:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x84) getsockopt$bt_hci(r0, 0x84, 0x74, &(0x7f0000001080)=""/4096, &(0x7f0000000040)=0x4f3) [ 1041.288975][T31921] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 00:53:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x3}) 00:53:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000080)) [ 1041.349699][T31922] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 00:53:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 00:53:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000080)) 00:53:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x3}) 00:53:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @local}, {0x0, @remote}, 0xdf604086f0490e29, {}, 'nr0\x00'}) 00:53:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff000}, {0x80000006}]}, 0x10) [ 1041.522092][T31940] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 00:53:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r0, 0x0, 0xfffffd97, 0x0, &(0x7f0000000040)={0xa, 0x2000000004a23, 0x0, @empty}, 0x1c) recvmsg(r0, &(0x7f0000000080)={&(0x7f00000002c0)=@nl=@proc, 0x80, 0x0}, 0x2000) 00:53:44 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) [ 1041.679282][T31954] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 00:53:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff000}, {0x80000006}]}, 0x10) 00:53:44 executing program 5: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) 00:53:44 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000800c5012, &(0x7f0000000140)) 00:53:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 00:53:45 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000300)) 00:53:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff000}, {0x80000006}]}, 0x10) 00:53:45 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000300)) 00:53:45 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000800c5012, &(0x7f0000000140)) 00:53:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00\x87-\x82\x7f\xe0\r\xb9\x89\x10\xb0\xc8%\xd8vy\x9d\x98\xa1}\xa6\xb6b\xcabZh]<\x7fVbR\x89;\xfbY\xb5\xad-\x00\x8f\x1e\xb6z,^\xb1\x8cZZ\xcd\xc0\xdc\xd0\xac\x19\x12\x84{\xf9\xb7\x91\x0e(\xe2\xb0\xe5$W\x9bdF)\xd4\x86u;\xa2\xaf\xb9\x92\xb3\xc2\x04\x91\x93\xcc\xe5qp\xaf5n\xaf\x02D\x06\x9dQ\xea5\xc2Fq{\x9e\"`\xaf`\xda\xb9\xd8\xda\x15\xcc\xf1\xca\xe3\x05<\x14\xda\x9cm>\x85\x8a\xa01\xeb\xad\xc3D\xcf\xf0j\xaa\x89\xf5J\x141>\xeb\xc3\xaf\n\xf3\fX\x05\x11\x1b\xf0\xad,\x131f\xece7o\x8e\xdf\v\xa7*\x1duZ\\\x06\xcd\x91-\tC:\x18KI', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) pselect6(0x12, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, 0x0, 0x0) 00:53:45 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001100)='hybla\x00', 0x293) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x11, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) 00:53:45 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000300)) 00:53:45 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000800c5012, &(0x7f0000000140)) 00:53:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) 00:53:45 executing program 5: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) 00:53:45 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, &(0x7f0000000300)) 00:53:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00\x87-\x82\x7f\xe0\r\xb9\x89\x10\xb0\xc8%\xd8vy\x9d\x98\xa1}\xa6\xb6b\xcabZh]<\x7fVbR\x89;\xfbY\xb5\xad-\x00\x8f\x1e\xb6z,^\xb1\x8cZZ\xcd\xc0\xdc\xd0\xac\x19\x12\x84{\xf9\xb7\x91\x0e(\xe2\xb0\xe5$W\x9bdF)\xd4\x86u;\xa2\xaf\xb9\x92\xb3\xc2\x04\x91\x93\xcc\xe5qp\xaf5n\xaf\x02D\x06\x9dQ\xea5\xc2Fq{\x9e\"`\xaf`\xda\xb9\xd8\xda\x15\xcc\xf1\xca\xe3\x05<\x14\xda\x9cm>\x85\x8a\xa01\xeb\xad\xc3D\xcf\xf0j\xaa\x89\xf5J\x141>\xeb\xc3\xaf\n\xf3\fX\x05\x11\x1b\xf0\xad,\x131f\xece7o\x8e\xdf\v\xa7*\x1duZ\\\x06\xcd\x91-\tC:\x18KI', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) pselect6(0x12, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, 0x0, 0x0) 00:53:45 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000800c5012, &(0x7f0000000140)) [ 1042.386769][T32005] vcan0: MTU too low for tipc bearer 00:53:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100090c10000000000001400000", 0x58}], 0x1) [ 1042.443827][T32005] Enabling of bearer rejected, failed to enable media 00:53:45 executing program 4: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) 00:53:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00\x87-\x82\x7f\xe0\r\xb9\x89\x10\xb0\xc8%\xd8vy\x9d\x98\xa1}\xa6\xb6b\xcabZh]<\x7fVbR\x89;\xfbY\xb5\xad-\x00\x8f\x1e\xb6z,^\xb1\x8cZZ\xcd\xc0\xdc\xd0\xac\x19\x12\x84{\xf9\xb7\x91\x0e(\xe2\xb0\xe5$W\x9bdF)\xd4\x86u;\xa2\xaf\xb9\x92\xb3\xc2\x04\x91\x93\xcc\xe5qp\xaf5n\xaf\x02D\x06\x9dQ\xea5\xc2Fq{\x9e\"`\xaf`\xda\xb9\xd8\xda\x15\xcc\xf1\xca\xe3\x05<\x14\xda\x9cm>\x85\x8a\xa01\xeb\xad\xc3D\xcf\xf0j\xaa\x89\xf5J\x141>\xeb\xc3\xaf\n\xf3\fX\x05\x11\x1b\xf0\xad,\x131f\xece7o\x8e\xdf\v\xa7*\x1duZ\\\x06\xcd\x91-\tC:\x18KI', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) pselect6(0x12, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, 0x0, 0x0) 00:53:45 executing program 1: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) [ 1042.613652][T32014] vcan0: MTU too low for tipc bearer [ 1042.688032][T32014] Enabling of bearer rejected, failed to enable media 00:53:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00\x87-\x82\x7f\xe0\r\xb9\x89\x10\xb0\xc8%\xd8vy\x9d\x98\xa1}\xa6\xb6b\xcabZh]<\x7fVbR\x89;\xfbY\xb5\xad-\x00\x8f\x1e\xb6z,^\xb1\x8cZZ\xcd\xc0\xdc\xd0\xac\x19\x12\x84{\xf9\xb7\x91\x0e(\xe2\xb0\xe5$W\x9bdF)\xd4\x86u;\xa2\xaf\xb9\x92\xb3\xc2\x04\x91\x93\xcc\xe5qp\xaf5n\xaf\x02D\x06\x9dQ\xea5\xc2Fq{\x9e\"`\xaf`\xda\xb9\xd8\xda\x15\xcc\xf1\xca\xe3\x05<\x14\xda\x9cm>\x85\x8a\xa01\xeb\xad\xc3D\xcf\xf0j\xaa\x89\xf5J\x141>\xeb\xc3\xaf\n\xf3\fX\x05\x11\x1b\xf0\xad,\x131f\xece7o\x8e\xdf\v\xa7*\x1duZ\\\x06\xcd\x91-\tC:\x18KI', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) pselect6(0x12, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, 0x0, 0x0) 00:53:45 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001100)='hybla\x00', 0x293) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x11, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) 00:53:45 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000380)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x0, 0x2000000228, 0xa0000000000001f9}) 00:53:45 executing program 5: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) 00:53:46 executing program 4: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) 00:53:46 executing program 1: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) 00:53:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) 00:53:46 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000380)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x0, 0x2000000228, 0xa0000000000001f9}) [ 1043.107768][T32051] tls_set_device_offload_rx: netdev lo with no TLS offload 00:53:46 executing program 5: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) 00:53:46 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000380)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x0, 0x2000000228, 0xa0000000000001f9}) 00:53:46 executing program 4: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) 00:53:46 executing program 1: clock_gettime(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002300)}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/248) r1 = socket$inet(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\x01N\xb7\x00', @ifru_flags}) [ 1043.249448][T32057] vcan0: MTU too low for tipc bearer [ 1043.293082][T32057] Enabling of bearer rejected, failed to enable media 00:53:46 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000380)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x0, 0x2000000228, 0xa0000000000001f9}) 00:53:46 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000140)="400f2127c482c1aad40f06b8010000000f01d9640f35c4a17c5a4d65f30f0d951bbb05d1410f01cbc4427d9ecc66baa000b005ee", 0x34}], 0x1, 0x0, 0x0, 0x20c) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:53:46 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001100)='hybla\x00', 0x293) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x11, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) 00:53:46 executing program 1: r0 = socket$kcm(0x10, 0x2000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008125e00f80ecdb4cb9d902631912080003003b000003b60001007601000040d819a9060096d06fce", 0x2e}], 0x1}, 0x0) [ 1043.643674][T32084] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. 00:53:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x71, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) 00:53:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4008550c, &(0x7f0000000040)) [ 1043.765302][T32089] vhci_hcd: default hub control req: 1909 v0000 i0000 l0 [ 1043.877932][T32090] vcan0: MTU too low for tipc bearer [ 1043.886164][T32090] Enabling of bearer rejected, failed to enable media 00:53:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) 00:53:47 executing program 1: r0 = socket$kcm(0x10, 0x2000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008125e00f80ecdb4cb9d902631912080003003b000003b60001007601000040d819a9060096d06fce", 0x2e}], 0x1}, 0x0) 00:53:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 00:53:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x71, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) 00:53:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4008550c, &(0x7f0000000040)) [ 1043.991364][T32102] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1044.031482][T32103] vhci_hcd: default hub control req: 1909 v0000 i0000 l0 00:53:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 00:53:47 executing program 2: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001100)='hybla\x00', 0x293) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x11, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'ib', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) [ 1044.054708][T32106] tls_set_device_offload_rx: netdev lo with no TLS offload 00:53:47 executing program 1: r0 = socket$kcm(0x10, 0x2000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008125e00f80ecdb4cb9d902631912080003003b000003b60001007601000040d819a9060096d06fce", 0x2e}], 0x1}, 0x0) 00:53:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1044.182462][T32114] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. 00:53:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4008550c, &(0x7f0000000040)) 00:53:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x71, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) 00:53:47 executing program 1: r0 = socket$kcm(0x10, 0x2000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e0000001d008125e00f80ecdb4cb9d902631912080003003b000003b60001007601000040d819a9060096d06fce", 0x2e}], 0x1}, 0x0) [ 1044.307052][T32116] vcan0: MTU too low for tipc bearer [ 1044.351596][T32116] Enabling of bearer rejected, failed to enable media [ 1044.380598][T32126] vhci_hcd: default hub control req: 1909 v0000 i0000 l0 [ 1044.408785][T32123] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. 00:53:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) 00:53:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$rxrpc(0x21, 0x2, 0x2) sendto$rxrpc(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 00:53:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) 00:53:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x71, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) 00:53:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4008550c, &(0x7f0000000040)) 00:53:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) 00:53:48 executing program 4: syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote, @local, {[], @udp={0x2c00, 0x0, 0x8}}}}}}, 0x0) [ 1044.930226][T32141] vhci_hcd: default hub control req: 1909 v0000 i0000 l0 [ 1044.939284][T32134] tls_set_device_offload_rx: netdev lo with no TLS offload [ 1044.958941][T32143] tls_set_device_offload_rx: netdev lo with no TLS offload 00:53:48 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x0, @local, 'ip6erspan0\x00'}}) 00:53:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x10, &(0x7f00000001c0)={0x0, 0x2}, &(0x7f0000000040)=0x10) [ 1045.126235][T32146] tls_set_device_offload_rx: netdev lo with no TLS offload 00:53:48 executing program 4: syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote, @local, {[], @udp={0x2c00, 0x0, 0x8}}}}}}, 0x0) 00:53:48 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x0, @local, 'ip6erspan0\x00'}}) 00:53:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x10, &(0x7f00000001c0)={0x0, 0x2}, &(0x7f0000000040)=0x10) 00:53:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) 00:53:48 executing program 4: syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote, @local, {[], @udp={0x2c00, 0x0, 0x8}}}}}}, 0x0) 00:53:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) 00:53:48 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x0, @local, 'ip6erspan0\x00'}}) 00:53:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x10, &(0x7f00000001c0)={0x0, 0x2}, &(0x7f0000000040)=0x10) 00:53:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) [ 1045.829222][T32172] tls_set_device_offload_rx: netdev lo with no TLS offload 00:53:49 executing program 4: syz_emit_ethernet(0x140, &(0x7f0000000640)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2b, 0x0, @remote, @local, {[], @udp={0x2c00, 0x0, 0x8}}}}}}, 0x0) [ 1045.875860][T32176] tls_set_device_offload_rx: netdev lo with no TLS offload 00:53:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) 00:53:49 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x0, @local, 'ip6erspan0\x00'}}) 00:53:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) write(r0, &(0x7f0000000080)="2700000014000707030e0000120f0a0011000100f517363ba84fc8e3da95f5fe0012ff00004007", 0x27) 00:53:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x10, &(0x7f00000001c0)={0x0, 0x2}, &(0x7f0000000040)=0x10) 00:53:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x1d, &(0x7f0000000080)={&(0x7f0000000000)=@mpls_getroute={0x24, 0x1a, 0xffffff1f, 0x0, 0x0, {0x1e}, [@RTA_TTL_PROPAGATE={0x8, 0x4, 0x15}]}, 0x24}}, 0x0) [ 1046.027742][T32178] tls_set_device_offload_rx: netdev lo with no TLS offload [ 1046.106507][T32188] tls_set_device_offload_rx: netdev lo with no TLS offload 00:53:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x1d, &(0x7f0000000080)={&(0x7f0000000000)=@mpls_getroute={0x24, 0x1a, 0xffffff1f, 0x0, 0x0, {0x1e}, [@RTA_TTL_PROPAGATE={0x8, 0x4, 0x15}]}, 0x24}}, 0x0) 00:53:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x20, 0x1c, 0x8001, 0x0, 0x0, {0x4000000002}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 1046.298608][T32203] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 00:53:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000004bc0)=[{{&(0x7f0000004940)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000004a80), 0x2e, &(0x7f0000004ac0)=""/197, 0xc5}}], 0x1300, 0x0, &(0x7f0000004dc0)={0x77359400}) 00:53:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) write(r0, &(0x7f0000000080)="2700000014000707030e0000120f0a0011000100f517363ba84fc8e3da95f5fe0012ff00004007", 0x27) 00:53:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006580)=[{{0x0, 0x0, &(0x7f0000002000)=[{0x0}, {&(0x7f0000001f80)=""/68, 0x44}], 0x2}}], 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f00000005c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 00:53:49 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1/file0\x00', 0x0) renameat2(r0, &(0x7f00000002c0)='./file1/file0\x00', r0, &(0x7f0000000300)='./file0\x00', 0x0) 00:53:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x1d, &(0x7f0000000080)={&(0x7f0000000000)=@mpls_getroute={0x24, 0x1a, 0xffffff1f, 0x0, 0x0, {0x1e}, [@RTA_TTL_PROPAGATE={0x8, 0x4, 0x15}]}, 0x24}}, 0x0) 00:53:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x20, 0x1c, 0x8001, 0x0, 0x0, {0x4000000002}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 00:53:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) write(r0, &(0x7f0000000080)="2700000014000707030e0000120f0a0011000100f517363ba84fc8e3da95f5fe0012ff00004007", 0x27) 00:53:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x1d, &(0x7f0000000080)={&(0x7f0000000000)=@mpls_getroute={0x24, 0x1a, 0xffffff1f, 0x0, 0x0, {0x1e}, [@RTA_TTL_PROPAGATE={0x8, 0x4, 0x15}]}, 0x24}}, 0x0) 00:53:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006580)=[{{0x0, 0x0, &(0x7f0000002000)=[{0x0}, {&(0x7f0000001f80)=""/68, 0x44}], 0x2}}], 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f00000005c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) [ 1046.890122][T32218] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 00:53:50 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 00:53:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006580)=[{{0x0, 0x0, &(0x7f0000002000)=[{0x0}, {&(0x7f0000001f80)=""/68, 0x44}], 0x2}}], 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f00000005c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 00:53:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) write(r0, &(0x7f0000000080)="2700000014000707030e0000120f0a0011000100f517363ba84fc8e3da95f5fe0012ff00004007", 0x27) [ 1047.157254][T32228] tls_set_device_offload_rx: netdev lo with no TLS offload 00:53:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x8, 0x100000001, 0x8000000001}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r0}, 0x2c) 00:53:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x20, 0x1c, 0x8001, 0x0, 0x0, {0x4000000002}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 00:53:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006580)=[{{0x0, 0x0, &(0x7f0000002000)=[{0x0}, {&(0x7f0000001f80)=""/68, 0x44}], 0x2}}], 0x1, 0x0, 0x0) bind$alg(r0, &(0x7f00000005c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 00:53:51 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 00:53:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) fcntl$getown(r0, 0x9) syz_genetlink_get_family_id$tipc(&(0x7f00000012c0)='TIPC\x00') r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r1, &(0x7f0000001200)={0x2, 0x4e22, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000080)='0\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x20, 0x8500) r2 = syz_open_dev$radio(0x0, 0x1, 0x2) recvfrom$netrom(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x40, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@remote, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) syz_genetlink_get_family_id$nbd(0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f00000013c0)=0xc1, 0x4) fadvise64(r0, 0x0, 0xf62, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 00:53:51 executing program 2: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:51 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000001c0)={0x68, r0, 0x1, 0x0, 0x0, {{0x1, 0x29}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xfffffffffffffffe, @media='udp\x00'}}}}, 0x68}}, 0x0) 00:53:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x8, 0x100000001, 0x8000000001}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r0}, 0x2c) [ 1048.101492][T32257] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 00:53:51 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) 00:53:51 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000001c0)={0x68, r0, 0x1, 0x0, 0x0, {{0x1, 0x29}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xfffffffffffffffe, @media='udp\x00'}}}}, 0x68}}, 0x0) 00:53:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) fcntl$getown(r0, 0x9) syz_genetlink_get_family_id$tipc(&(0x7f00000012c0)='TIPC\x00') r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r1, &(0x7f0000001200)={0x2, 0x4e22, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000080)='0\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x20, 0x8500) r2 = syz_open_dev$radio(0x0, 0x1, 0x2) recvfrom$netrom(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x40, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@remote, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) syz_genetlink_get_family_id$nbd(0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f00000013c0)=0xc1, 0x4) fadvise64(r0, 0x0, 0xf62, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 00:53:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x8, 0x100000001, 0x8000000001}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r0}, 0x2c) 00:53:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x20, 0x1c, 0x8001, 0x0, 0x0, {0x4000000002}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) 00:53:51 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000001c0)={0x68, r0, 0x1, 0x0, 0x0, {{0x1, 0x29}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xfffffffffffffffe, @media='udp\x00'}}}}, 0x68}}, 0x0) 00:53:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x8, 0x100000001, 0x8000000001}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r0}, 0x2c) 00:53:51 executing program 5: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r0, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001400192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) [ 1048.536101][T32287] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 00:53:51 executing program 1: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000001c0)={0x68, r0, 0x1, 0x0, 0x0, {{0x1, 0x29}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xfffffffffffffffe, @media='udp\x00'}}}}, 0x68}}, 0x0) 00:53:52 executing program 2: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="00001a9c540300000014e71f3be4a14e6e05a7de154f3834dffa027c1cbcb94aca7276b22c7ae2a9826c2c4874c625eb3565067c106b4a8521140f0ca850ec3c160f7d237f842a9e70b46481c5a83ded1170011f2631d0036de21cf39b3ed94003388f462e03d5d57f9d4809be8037b11e901aec74944fb63249bb208e57dbc7a02f664934f686084853e135c1dd4217ea83785dabf7e3003d125d0513fd58e36196b9bc3d1a11b6c6e3ae3d18827151d2378fee93c17b95d370d38f0b4a86a63a65e2d3d71681ad64255ad3ca1e4605d1b0302e514799c99c9580b73295a0a13e405488be5c355bf7692d4055ceb95354a09a64e6815cec1476e526da7b5ee83319e1a89e4b1e508e188960267e24d319ea2fc91a9e8338d1abe934b7fe50960d18509d888d1d7cde75ae5bd747d55d76c0fd84"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:52 executing program 1: syz_execute_func(&(0x7f0000000180)="1cffb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c00c46239011d000000008fe9589b26c7e4c753fbc46580c70f34589be1fe2533d4f4442533d4f44407c4c2b90a23f21e657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f000f673d6d4600460045e145af000f9a99030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fada2a236660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 00:53:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) fcntl$getown(r0, 0x9) syz_genetlink_get_family_id$tipc(&(0x7f00000012c0)='TIPC\x00') r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r1, &(0x7f0000001200)={0x2, 0x4e22, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000080)='0\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x20, 0x8500) r2 = syz_open_dev$radio(0x0, 0x1, 0x2) recvfrom$netrom(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x40, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@remote, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) syz_genetlink_get_family_id$nbd(0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f00000013c0)=0xc1, 0x4) fadvise64(r0, 0x0, 0xf62, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 00:53:52 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904084865160b00030020021600000009000e00010000000500003e00000000", 0x2e}], 0x1}, 0x0) 00:53:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) fcntl$getown(r0, 0x9) syz_genetlink_get_family_id$tipc(&(0x7f00000012c0)='TIPC\x00') r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r1, &(0x7f0000001200)={0x2, 0x4e22, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000080)='0\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x20, 0x8500) r2 = syz_open_dev$radio(0x0, 0x1, 0x2) recvfrom$netrom(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x40, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@remote, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) syz_genetlink_get_family_id$nbd(0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f00000013c0)=0xc1, 0x4) fadvise64(r0, 0x0, 0xf62, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 00:53:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="0c13b5b598cd801b69e4f56962f5696200d98fa82895254226f45df8c441395bf91cc18fe9589b26e102edfec4427d822a2adfdfe4da7676f2168f4808eebce00000802000c421513666f3e1dc8fe9509b9b9b000000c1ea01eff265dc5f00c36645363ef8d9ce0faee42c24a1a1460f569f00082640c401fe1d8bf4f4df646736676666430fefb3000000007250314f864f86450f17720d14111d54111d00") 00:53:52 executing program 1: syz_execute_func(&(0x7f0000000180)="1cffb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c00c46239011d000000008fe9589b26c7e4c753fbc46580c70f34589be1fe2533d4f4442533d4f44407c4c2b90a23f21e657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f000f673d6d4600460045e145af000f9a99030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fada2a236660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") [ 1049.242605][T32313] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 00:53:52 executing program 1: syz_execute_func(&(0x7f0000000180)="1cffb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c00c46239011d000000008fe9589b26c7e4c753fbc46580c70f34589be1fe2533d4f4442533d4f44407c4c2b90a23f21e657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f000f673d6d4600460045e145af000f9a99030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fada2a236660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") [ 1049.300110][T32313] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 00:53:52 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904084865160b00030020021600000009000e00010000000500003e00000000", 0x2e}], 0x1}, 0x0) 00:53:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="0c13b5b598cd801b69e4f56962f5696200d98fa82895254226f45df8c441395bf91cc18fe9589b26e102edfec4427d822a2adfdfe4da7676f2168f4808eebce00000802000c421513666f3e1dc8fe9509b9b9b000000c1ea01eff265dc5f00c36645363ef8d9ce0faee42c24a1a1460f569f00082640c401fe1d8bf4f4df646736676666430fefb3000000007250314f864f86450f17720d14111d54111d00") 00:53:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) fcntl$getown(r0, 0x9) syz_genetlink_get_family_id$tipc(&(0x7f00000012c0)='TIPC\x00') r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r1, &(0x7f0000001200)={0x2, 0x4e22, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000080)='0\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x20, 0x8500) r2 = syz_open_dev$radio(0x0, 0x1, 0x2) recvfrom$netrom(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x40, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@remote, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) syz_genetlink_get_family_id$nbd(0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f00000013c0)=0xc1, 0x4) fadvise64(r0, 0x0, 0xf62, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 00:53:52 executing program 1: syz_execute_func(&(0x7f0000000180)="1cffb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c00c46239011d000000008fe9589b26c7e4c753fbc46580c70f34589be1fe2533d4f4442533d4f44407c4c2b90a23f21e657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f000f673d6d4600460045e145af000f9a99030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fada2a236660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") [ 1049.840871][T32327] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1049.861714][T32322] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1049.917998][T32322] FAT-fs (loop2): Filesystem has been set read-only [ 1049.998418][T32322] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 1050.083695][T32322] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 1050.165251][T32322] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) [ 1050.331529][T32321] FAT-fs (loop2): error, invalid access to FAT (entry 0x00006500) 00:53:53 executing program 2: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="00001a9c540300000014e71f3be4a14e6e05a7de154f3834dffa027c1cbcb94aca7276b22c7ae2a9826c2c4874c625eb3565067c106b4a8521140f0ca850ec3c160f7d237f842a9e70b46481c5a83ded1170011f2631d0036de21cf39b3ed94003388f462e03d5d57f9d4809be8037b11e901aec74944fb63249bb208e57dbc7a02f664934f686084853e135c1dd4217ea83785dabf7e3003d125d0513fd58e36196b9bc3d1a11b6c6e3ae3d18827151d2378fee93c17b95d370d38f0b4a86a63a65e2d3d71681ad64255ad3ca1e4605d1b0302e514799c99c9580b73295a0a13e405488be5c355bf7692d4055ceb95354a09a64e6815cec1476e526da7b5ee83319e1a89e4b1e508e188960267e24d319ea2fc91a9e8338d1abe934b7fe50960d18509d888d1d7cde75ae5bd747d55d76c0fd84"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) fcntl$getown(r0, 0x9) syz_genetlink_get_family_id$tipc(&(0x7f00000012c0)='TIPC\x00') r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r1, &(0x7f0000001200)={0x2, 0x4e22, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000080)='0\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x20, 0x8500) r2 = syz_open_dev$radio(0x0, 0x1, 0x2) recvfrom$netrom(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x40, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@remote, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) syz_genetlink_get_family_id$nbd(0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f00000013c0)=0xc1, 0x4) fadvise64(r0, 0x0, 0xf62, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 00:53:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="0c13b5b598cd801b69e4f56962f5696200d98fa82895254226f45df8c441395bf91cc18fe9589b26e102edfec4427d822a2adfdfe4da7676f2168f4808eebce00000802000c421513666f3e1dc8fe9509b9b9b000000c1ea01eff265dc5f00c36645363ef8d9ce0faee42c24a1a1460f569f00082640c401fe1d8bf4f4df646736676666430fefb3000000007250314f864f86450f17720d14111d54111d00") 00:53:53 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:53 executing program 0: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:53 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904084865160b00030020021600000009000e00010000000500003e00000000", 0x2e}], 0x1}, 0x0) [ 1050.638194][T32351] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1050.681341][T32351] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 00:53:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="0c13b5b598cd801b69e4f56962f5696200d98fa82895254226f45df8c441395bf91cc18fe9589b26e102edfec4427d822a2adfdfe4da7676f2168f4808eebce00000802000c421513666f3e1dc8fe9509b9b9b000000c1ea01eff265dc5f00c36645363ef8d9ce0faee42c24a1a1460f569f00082640c401fe1d8bf4f4df646736676666430fefb3000000007250314f864f86450f17720d14111d54111d00") 00:53:53 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000020008151e00f80ecdb4cb904084865160b00030020021600000009000e00010000000500003e00000000", 0x2e}], 0x1}, 0x0) 00:53:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) fcntl$getown(r0, 0x9) syz_genetlink_get_family_id$tipc(&(0x7f00000012c0)='TIPC\x00') r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r1, &(0x7f0000001200)={0x2, 0x4e22, @broadcast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f0000000080)='0\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x20, 0x8500) r2 = syz_open_dev$radio(0x0, 0x1, 0x2) recvfrom$netrom(r2, &(0x7f0000000200)=""/4096, 0x1000, 0x40, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@remote, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) syz_genetlink_get_family_id$nbd(0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f00000013c0)=0xc1, 0x4) fadvise64(r0, 0x0, 0xf62, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 00:53:54 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) 00:53:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x9, @raw_data="65959c3418b0a8484e4d36314f9e395ffe7eadc4e5efe4eb08b2818231f0b171d01a6ccab9aa61f9334780ee00617fd51776eba2ff6638152706d334b8c317bd72cb367b00b738a668c1f265769a8b83bdfba7f2a6a533f765362117325765424a42ff769cc614819d4ffe8bb06797edd61780727c8acae9d1114979bc5a6df889dd78b39d1456720c394c7d690a6659812de9ef718772c8b725bccea7fa69346c281c827ab34639f139b818aeb4219bb23f6072e27fa590731d28c92807ba70d895fb32d01fb64a"}) 00:53:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000340)=""/211, 0xd3, 0x3) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x2, 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000480)={0x800000}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000180)={0x0, 0x8, 0x0, 'queue0\x00'}) 00:53:54 executing program 2: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:54 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x9, @raw_data="65959c3418b0a8484e4d36314f9e395ffe7eadc4e5efe4eb08b2818231f0b171d01a6ccab9aa61f9334780ee00617fd51776eba2ff6638152706d334b8c317bd72cb367b00b738a668c1f265769a8b83bdfba7f2a6a533f765362117325765424a42ff769cc614819d4ffe8bb06797edd61780727c8acae9d1114979bc5a6df889dd78b39d1456720c394c7d690a6659812de9ef718772c8b725bccea7fa69346c281c827ab34639f139b818aeb4219bb23f6072e27fa590731d28c92807ba70d895fb32d01fb64a"}) 00:53:54 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000340)=""/211, 0xd3, 0x3) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x2, 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000480)={0x800000}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000180)={0x0, 0x8, 0x0, 'queue0\x00'}) 00:53:54 executing program 0: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="00001a9c540300000014e71f3be4a14e6e05a7de154f3834dffa027c1cbcb94aca7276b22c7ae2a9826c2c4874c625eb3565067c106b4a8521140f0ca850ec3c160f7d237f842a9e70b46481c5a83ded1170011f2631d0036de21cf39b3ed94003388f462e03d5d57f9d4809be8037b11e901aec74944fb63249bb208e57dbc7a02f664934f686084853e135c1dd4217ea83785dabf7e3003d125d0513fd58e36196b9bc3d1a11b6c6e3ae3d18827151d2378fee93c17b95d370d38f0b4a86a63a65e2d3d71681ad64255ad3ca1e4605d1b0302e514799c99c9580b73295a0a13e405488be5c355bf7692d4055ceb95354a09a64e6815cec1476e526da7b5ee83319e1a89e4b1e508e188960267e24d319ea2fc91a9e8338d1abe934b7fe50960d18509d888d1d7cde75ae5bd747d55d76c0fd84"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:54 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) 00:53:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000340)=""/211, 0xd3, 0x3) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x2, 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000480)={0x800000}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000180)={0x0, 0x8, 0x0, 'queue0\x00'}) [ 1052.012649][T32412] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1052.056761][T32400] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1052.090688][T32412] FAT-fs (loop1): Filesystem has been set read-only 00:53:55 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) 00:53:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000340)=""/211, 0xd3, 0x3) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x2, 0x0) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000480)={0x800000}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000180)={0x0, 0x8, 0x0, 'queue0\x00'}) 00:53:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x9, @raw_data="65959c3418b0a8484e4d36314f9e395ffe7eadc4e5efe4eb08b2818231f0b171d01a6ccab9aa61f9334780ee00617fd51776eba2ff6638152706d334b8c317bd72cb367b00b738a668c1f265769a8b83bdfba7f2a6a533f765362117325765424a42ff769cc614819d4ffe8bb06797edd61780727c8acae9d1114979bc5a6df889dd78b39d1456720c394c7d690a6659812de9ef718772c8b725bccea7fa69346c281c827ab34639f139b818aeb4219bb23f6072e27fa590731d28c92807ba70d895fb32d01fb64a"}) [ 1052.120399][T32400] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 1052.278047][T32398] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 00:53:55 executing program 1: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x9, @raw_data="65959c3418b0a8484e4d36314f9e395ffe7eadc4e5efe4eb08b2818231f0b171d01a6ccab9aa61f9334780ee00617fd51776eba2ff6638152706d334b8c317bd72cb367b00b738a668c1f265769a8b83bdfba7f2a6a533f765362117325765424a42ff769cc614819d4ffe8bb06797edd61780727c8acae9d1114979bc5a6df889dd78b39d1456720c394c7d690a6659812de9ef718772c8b725bccea7fa69346c281c827ab34639f139b818aeb4219bb23f6072e27fa590731d28c92807ba70d895fb32d01fb64a"}) 00:53:56 executing program 0: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = semget(0x1, 0x3, 0x100) semctl$IPC_INFO(r0, 0x0, 0x3, &(0x7f0000000300)=""/170) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x134) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) truncate(0x0, 0x9) unlink(&(0x7f0000001e00)='./bus\x00') fadvise64(r2, 0x0, 0x1, 0x3) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 00:53:56 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @bcast, @netrom, @bcast, @rose]}, 0x10) listen(r0, 0x0) accept(r0, 0x0, 0x0) 00:53:56 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) 00:53:56 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x1001, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, 0x0, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) r1 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r1, 0xe, 0x0) 00:53:56 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000000e40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000e80)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x3300000000000000, &(0x7f00000009c0), 0x97, &(0x7f00000000c0), 0x0, 0x8dffffff00000000}}], 0x40000000000026a, 0x0) 00:53:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040), 0x8) listen(r1, 0x0) setsockopt(r1, 0x0, 0x7, 0x0, 0x0) 00:53:56 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x1001, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, 0x0, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) r1 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r1, 0xe, 0x0) 00:53:56 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x1001, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, 0x0, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) r1 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r1, 0xe, 0x0) 00:53:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040), 0x8) listen(r1, 0x0) setsockopt(r1, 0x0, 0x7, 0x0, 0x0) 00:53:56 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x1001, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, 0x0, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) r1 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r1, 0xe, 0x0) 00:53:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040), 0x8) listen(r1, 0x0) setsockopt(r1, 0x0, 0x7, 0x0, 0x0) 00:53:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040), 0x8) listen(r1, 0x0) setsockopt(r1, 0x0, 0x7, 0x0, 0x0) 00:53:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040), 0x8) listen(r1, 0x0) setsockopt(r1, 0x0, 0x7, 0x0, 0x0) 00:53:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000000)={0x80000}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x50003}) 00:53:57 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x1001, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, 0x0, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) r1 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r1, 0xe, 0x0) 00:53:57 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x1001, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, 0x0, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) r1 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r1, 0xe, 0x0) 00:53:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040), 0x8) listen(r1, 0x0) setsockopt(r1, 0x0, 0x7, 0x0, 0x0) 00:53:57 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@sg0='ubev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ubifs\x00', 0x0, 0x0) 00:53:57 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, 0x0, 0xfffffffffffffeb0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)={0x7}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:53:57 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@sg0='ubev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ubifs\x00', 0x0, 0x0) 00:53:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040), 0x8) listen(r1, 0x0) setsockopt(r1, 0x0, 0x7, 0x0, 0x0) 00:53:58 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x1001, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, 0x0, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) r1 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_INFO(r1, 0xe, 0x0) 00:53:58 executing program 4: r0 = inotify_init() mkdir(&(0x7f0000000040)='./control\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0xc03) inotify_add_watch(r0, &(0x7f0000000100)='./control\x00', 0x200) [ 1054.685304][T32491] UBIFS error (pid: 32491): cannot open "ubev/sg0", error -22 [ 1054.863726][T32501] UBIFS error (pid: 32501): cannot open "ubev/sg0", error -22 00:53:58 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@sg0='ubev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ubifs\x00', 0x0, 0x0) [ 1054.971649][T32509] UBIFS error (pid: 32509): cannot open "ubev/sg0", error -22 00:53:58 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f90a, 0xfffdfffffffffffe, [], @string=&(0x7f0000000040)}}) 00:53:58 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:58 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@sg0='ubev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ubifs\x00', 0x0, 0x0) 00:53:58 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:58 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000a80)="ad56b6cc0400fb8b65d8b4ac2ca35c6e", 0x10) sendto$rose(r1, &(0x7f0000000180)="88e32cf7556b7f6dfeecd2b42016f145", 0x10, 0x0, 0x0, 0x0) 00:53:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0x36, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 00:53:58 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$VT_ACTIVATE(r0, 0x541b, 0x70c000) 00:53:58 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:58 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) chroot(&(0x7f0000000340)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0xf) [ 1055.379535][T32524] UBIFS error (pid: 32524): cannot open "ubev/sg0", error -22 00:53:58 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:58 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f90a, 0xfffdfffffffffffe, [], @string=&(0x7f0000000040)}}) 00:53:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$VT_ACTIVATE(r0, 0x541b, 0x70c000) 00:53:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='.\x04\x00group/syz0\x00', 0x1ff) 00:53:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$VT_ACTIVATE(r0, 0x541b, 0x70c000) 00:53:59 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:59 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='.\x04\x00group/syz0\x00', 0x1ff) 00:53:59 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) chroot(&(0x7f0000000340)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0xf) 00:53:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) ioctl$VT_ACTIVATE(r0, 0x541b, 0x70c000) 00:53:59 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f90a, 0xfffdfffffffffffe, [], @string=&(0x7f0000000040)}}) 00:53:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='.\x04\x00group/syz0\x00', 0x1ff) 00:53:59 executing program 0: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r0 = socket(0x0, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, 0x0) r1 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000680)="230000005e0081aee4050c00000f00000000a30000ffffff9e8b1832e0b58bc609f6d8", 0x23}], 0x1}, 0x0) 00:53:59 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) chroot(&(0x7f0000000340)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0xf) 00:53:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='.\x04\x00group/syz0\x00', 0x1ff) 00:53:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000400)) 00:53:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r1, 0x541b, 0x70c000) 00:53:59 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000003) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000080)=0x1) ioctl(r1, 0x3, &(0x7f0000000340)="679c09a8b4af8be74be9cc7436f1b11da5ef4d34e8448f47965d5524b1916ebe56f0690a871cae9658c7675886ca37be6c59493860318f22ee7bff8261a9f415fbce91ad643ce9c0119775b299fa7b4ee3e778b8af2388dfea94ce54f1f7d2901c9f7d9865df89271382d2acc65d8413800be2ecbd7144e444c3a601f1ad38dc9365efea80f9907f9f107764f2ce329413020a226c5cc16aab4cd8d61973b68553dd0927685090b935ba545fbe30e9338b85bbe401e06650be") openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x1c, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x1, @loopback, 0x2}]}, &(0x7f0000000300)=0x10) 00:53:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000400)) 00:53:59 executing program 4: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000400)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x0, 0x0, 0x9, 0x2, 0x3, 0x3e, 0x1, 0x0, 0x38, 0x265, 0x0, 0x7, 0x20, 0x2, 0x7fff, 0x7, 0x6}, [{0x6, 0x0, 0x5, 0x0, 0xf15, 0x0, 0x0, 0x2}], "574bb9a05d86c910b07b9e426d0b6265fa788d91fc2925d9d81b23bf43ec944187e89b429e6fd6ac58b8d65be42e96f81acdcf27199c8c895adfd842145ed9ef87fc8a1d83ea4d8d48e3da40770309a197a31c8852a0f8c0df5780080c07c8df14d08829ea25fea120e6d51e4cb50204e9aa5d08cd493a7fc32be329625a39a64ad79c9d262690685aaf51d6"}, 0xe4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cd", 0x4c, 0x40000, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="c8adeb4247df9bda93edc014950f4847dedc41409fa928c3b24fced2dbee3b4bb0987e8d4e91e2a99113e1ccad64a8c711330cd87dfb9ed9d3c99879d6badb8e66a2522fc9075f4b5bc19c1325f656176f022ba502536423e210791892052dc4610f2b6bef8b", 0x0}, 0x18) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x32a2fc02, 0x0) 00:53:59 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f90a, 0xfffdfffffffffffe, [], @string=&(0x7f0000000040)}}) 00:53:59 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) chroot(&(0x7f0000000340)='./file0\x00') umount2(&(0x7f00000001c0)='./file0\x00', 0xf) 00:53:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000400)) 00:53:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r1, 0x541b, 0x70c000) 00:53:59 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000006c0)="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") openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) 00:54:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r1, 0x541b, 0x70c000) 00:54:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000400)) 00:54:00 executing program 2: r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000100)=0x101, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 00:54:00 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x100000000000010b) clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:54:00 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 00:54:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r1, 0x541b, 0x70c000) [ 1057.253061][ T26] audit: type=1804 audit(3240.384:218): pid=32648 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir460490833/syzkaller.8VC4JV/1048/bus" dev="sda1" ino=17089 res=1 00:54:00 executing program 4: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000400)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x0, 0x0, 0x9, 0x2, 0x3, 0x3e, 0x1, 0x0, 0x38, 0x265, 0x0, 0x7, 0x20, 0x2, 0x7fff, 0x7, 0x6}, [{0x6, 0x0, 0x5, 0x0, 0xf15, 0x0, 0x0, 0x2}], "574bb9a05d86c910b07b9e426d0b6265fa788d91fc2925d9d81b23bf43ec944187e89b429e6fd6ac58b8d65be42e96f81acdcf27199c8c895adfd842145ed9ef87fc8a1d83ea4d8d48e3da40770309a197a31c8852a0f8c0df5780080c07c8df14d08829ea25fea120e6d51e4cb50204e9aa5d08cd493a7fc32be329625a39a64ad79c9d262690685aaf51d6"}, 0xe4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cd", 0x4c, 0x40000, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="c8adeb4247df9bda93edc014950f4847dedc41409fa928c3b24fced2dbee3b4bb0987e8d4e91e2a99113e1ccad64a8c711330cd87dfb9ed9d3c99879d6badb8e66a2522fc9075f4b5bc19c1325f656176f022ba502536423e210791892052dc4610f2b6bef8b", 0x0}, 0x18) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x32a2fc02, 0x0) 00:54:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/67, 0x15) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x1fffff, 0x0, &(0x7f0000130000/0x800000)=nil) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff001, 0x10000) openat$vcs(0xffffffffffffff9c, 0x0, 0xffdfffffffffffff, 0x0) 00:54:00 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) openat$full(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xffffffffffffffe4) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10004, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x400000000000000a, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000100)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000380), &(0x7f0000001380)) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000080)) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) tkill(r0, 0x1000000000016) 00:54:00 executing program 2: r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000100)=0x101, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) [ 1058.048503][ T26] audit: type=1804 audit(3241.174:219): pid=32664 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir460490833/syzkaller.8VC4JV/1048/bus" dev="sda1" ino=17089 res=1 00:54:01 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 1058.192232][ T26] audit: type=1804 audit(3241.184:220): pid=32663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir460490833/syzkaller.8VC4JV/1048/bus" dev="sda1" ino=17089 res=1 00:54:01 executing program 2: r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000100)=0x101, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) [ 1058.399019][ T26] audit: type=1804 audit(3241.224:221): pid=32666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir460490833/syzkaller.8VC4JV/1048/bus" dev="sda1" ino=17089 res=1 00:54:01 executing program 4: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000400)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x0, 0x0, 0x9, 0x2, 0x3, 0x3e, 0x1, 0x0, 0x38, 0x265, 0x0, 0x7, 0x20, 0x2, 0x7fff, 0x7, 0x6}, [{0x6, 0x0, 0x5, 0x0, 0xf15, 0x0, 0x0, 0x2}], "574bb9a05d86c910b07b9e426d0b6265fa788d91fc2925d9d81b23bf43ec944187e89b429e6fd6ac58b8d65be42e96f81acdcf27199c8c895adfd842145ed9ef87fc8a1d83ea4d8d48e3da40770309a197a31c8852a0f8c0df5780080c07c8df14d08829ea25fea120e6d51e4cb50204e9aa5d08cd493a7fc32be329625a39a64ad79c9d262690685aaf51d6"}, 0xe4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cd", 0x4c, 0x40000, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="c8adeb4247df9bda93edc014950f4847dedc41409fa928c3b24fced2dbee3b4bb0987e8d4e91e2a99113e1ccad64a8c711330cd87dfb9ed9d3c99879d6badb8e66a2522fc9075f4b5bc19c1325f656176f022ba502536423e210791892052dc4610f2b6bef8b", 0x0}, 0x18) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x32a2fc02, 0x0) [ 1058.617305][ T26] audit: type=1804 audit(3241.464:222): pid=32669 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir460490833/syzkaller.8VC4JV/1049/bus" dev="sda1" ino=16676 res=1 00:54:01 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) openat$full(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xffffffffffffffe4) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10004, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x400000000000000a, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000100)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000380), &(0x7f0000001380)) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000080)) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) tkill(r0, 0x1000000000016) 00:54:02 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 00:54:02 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x100000000000010b) clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:54:02 executing program 2: r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000100)=0x101, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 00:54:02 executing program 4: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000400)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x0, 0x0, 0x9, 0x2, 0x3, 0x3e, 0x1, 0x0, 0x38, 0x265, 0x0, 0x7, 0x20, 0x2, 0x7fff, 0x7, 0x6}, [{0x6, 0x0, 0x5, 0x0, 0xf15, 0x0, 0x0, 0x2}], "574bb9a05d86c910b07b9e426d0b6265fa788d91fc2925d9d81b23bf43ec944187e89b429e6fd6ac58b8d65be42e96f81acdcf27199c8c895adfd842145ed9ef87fc8a1d83ea4d8d48e3da40770309a197a31c8852a0f8c0df5780080c07c8df14d08829ea25fea120e6d51e4cb50204e9aa5d08cd493a7fc32be329625a39a64ad79c9d262690685aaf51d6"}, 0xe4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cd", 0x4c, 0x40000, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000000)="c8adeb4247df9bda93edc014950f4847dedc41409fa928c3b24fced2dbee3b4bb0987e8d4e91e2a99113e1ccad64a8c711330cd87dfb9ed9d3c99879d6badb8e66a2522fc9075f4b5bc19c1325f656176f022ba502536423e210791892052dc4610f2b6bef8b", 0x0}, 0x18) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x32a2fc02, 0x0) [ 1059.461961][ T26] audit: type=1804 audit(3242.594:223): pid=32685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir460490833/syzkaller.8VC4JV/1050/bus" dev="sda1" ino=16653 res=1 00:54:03 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) openat$full(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xffffffffffffffe4) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10004, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x400000000000000a, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000100)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000380), &(0x7f0000001380)) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000080)) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) tkill(r0, 0x1000000000016) 00:54:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/67, 0x15) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x1fffff, 0x0, &(0x7f0000130000/0x800000)=nil) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff001, 0x10000) openat$vcs(0xffffffffffffff9c, 0x0, 0xffdfffffffffffff, 0x0) 00:54:03 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) openat$full(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xffffffffffffffe4) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10004, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x400000000000000a, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000100)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000380), &(0x7f0000001380)) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000080)) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) tkill(r0, 0x1000000000016) 00:54:03 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 00:54:03 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 00:54:03 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x100000000000010b) clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1060.859886][ T26] audit: type=1804 audit(3243.984:224): pid=32709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir493256102/syzkaller.ZoY9CW/1420/bus" dev="sda1" ino=16708 res=1 00:54:04 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) openat$full(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xffffffffffffffe4) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10004, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x400000000000000a, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000100)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000380), &(0x7f0000001380)) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000080)) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) tkill(r0, 0x1000000000016) [ 1061.007741][ T26] audit: type=1804 audit(3243.984:225): pid=32707 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir460490833/syzkaller.8VC4JV/1051/bus" dev="sda1" ino=16707 res=1 00:54:05 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 00:54:05 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) openat$full(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xffffffffffffffe4) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10004, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x400000000000000a, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000100)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000380), &(0x7f0000001380)) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000080)) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) tkill(r0, 0x1000000000016) 00:54:05 executing program 5: syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x100000000000010b) clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:54:05 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) openat$full(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xffffffffffffffe4) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x10004, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x400000000000000a, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000300)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0)=0x6, 0x4) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000100)) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000380), &(0x7f0000001380)) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000080)) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) tkill(r0, 0x1000000000016) 00:54:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/67, 0x15) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x1fffff, 0x0, &(0x7f0000130000/0x800000)=nil) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff001, 0x10000) openat$vcs(0xffffffffffffff9c, 0x0, 0xffdfffffffffffff, 0x0) [ 1062.086117][ T26] audit: type=1804 audit(3245.214:226): pid=32724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir493256102/syzkaller.ZoY9CW/1421/bus" dev="sda1" ino=16662 res=1 00:54:06 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 1063.486720][ T26] audit: type=1804 audit(3246.614:227): pid=32742 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir493256102/syzkaller.ZoY9CW/1422/bus" dev="sda1" ino=16653 res=1 00:54:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/67, 0x15) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x1fffff, 0x0, &(0x7f0000130000/0x800000)=nil) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff001, 0x10000) openat$vcs(0xffffffffffffff9c, 0x0, 0xffdfffffffffffff, 0x0) 00:54:07 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 00:54:07 executing program 2: syz_execute_func(&(0x7f0000000380)="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") 00:54:07 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000104, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1b00dc000000dc", 0xa}], 0x0, 0x24) [ 1064.261795][ T26] audit: type=1804 audit(3247.384:228): pid=32750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir848224124/syzkaller.BUxaFx/321/bus" dev="sda1" ino=16669 res=1 00:54:07 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x4) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:54:07 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 00:54:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x2000000000001, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) ioctl$int_in(r1, 0x8000000005452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x1) [ 1064.592836][T32752] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 1064.703194][T32752] BFS-fs: bfs_fill_super(): Impossible last inode number 873 > 513 on loop5 [ 1064.712613][ T26] audit: type=1804 audit(3247.834:229): pid=32762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir848224124/syzkaller.BUxaFx/322/bus" dev="sda1" ino=16637 res=1 00:54:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x2000000000001, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) ioctl$int_in(r1, 0x8000000005452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x1) [ 1065.004040][T32752] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 00:54:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x2000000000001, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) ioctl$int_in(r1, 0x8000000005452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x1) 00:54:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/67, 0x15) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x1fffff, 0x0, &(0x7f0000130000/0x800000)=nil) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff001, 0x10000) openat$vcs(0xffffffffffffff9c, 0x0, 0xffdfffffffffffff, 0x0) [ 1065.068739][T32752] BFS-fs: bfs_fill_super(): Impossible last inode number 873 > 513 on loop5 00:54:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x2000000000001, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) ioctl$int_in(r1, 0x8000000005452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x1) 00:54:08 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000104, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1b00dc000000dc", 0xa}], 0x0, 0x24) [ 1065.599838][ T315] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 1065.682545][ T315] BFS-fs: bfs_fill_super(): Impossible last inode number 873 > 513 on loop5 00:54:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/67, 0x15) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x1fffff, 0x0, &(0x7f0000130000/0x800000)=nil) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff001, 0x10000) openat$vcs(0xffffffffffffff9c, 0x0, 0xffdfffffffffffff, 0x0) 00:54:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x2000000000001, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) ioctl$int_in(r1, 0x8000000005452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x1) 00:54:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x2000000000001, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) ioctl$int_in(r1, 0x8000000005452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x1) 00:54:09 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) write$evdev(r0, &(0x7f0000000600)=[{{0x0, 0x7530}}], 0x18) chdir(0x0) stat(0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 00:54:09 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000104, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1b00dc000000dc", 0xa}], 0x0, 0x24) [ 1066.541183][ T327] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 00:54:09 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r1 = getpid() write$cgroup_pid(r0, &(0x7f0000000080)=r1, 0x12) [ 1066.572654][ T26] audit: type=1804 audit(3249.704:230): pid=330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir848224124/syzkaller.BUxaFx/323/bus" dev="sda1" ino=16801 res=1 [ 1066.619083][ T327] BFS-fs: bfs_fill_super(): Impossible last inode number 873 > 513 on loop5 00:54:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$unix(0x1, 0x2000000000001, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r2, 0x0, 0x0) ioctl$int_in(r1, 0x8000000005452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x1) 00:54:10 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x3) 00:54:10 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x3) 00:54:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/67, 0x15) mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x1fffff, 0x0, &(0x7f0000130000/0x800000)=nil) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff001, 0x10000) openat$vcs(0xffffffffffffff9c, 0x0, 0xffdfffffffffffff, 0x0) 00:54:11 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000104, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1b00dc000000dc", 0xa}], 0x0, 0x24) 00:54:11 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x3) [ 1068.007288][ T355] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 1068.071226][ T355] BFS-fs: bfs_fill_super(): Impossible last inode number 873 > 513 on loop5 00:54:11 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x3) 00:54:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 00:54:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) 00:54:22 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x3, 0x13, 0x100000000000000, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff06}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:54:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = socket(0x11, 0x80803, 0x6) bind$pptp(r2, &(0x7f0000000200)={0x18, 0x2, {0x3, @rand_addr=0x7}}, 0x1e) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, 0x0, 0x10000024c) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) getpeername$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f0000000280)=0x10) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1e, 0x1, 0x0) sendmsg(r3, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x111ed0) close(r3) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) 00:54:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) shutdown(r1, 0x0) 00:54:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000009) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000200)=0x2) 00:54:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) shutdown(r1, 0x0) [ 1079.431164][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1079.437052][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:54:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) [ 1079.604266][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1079.610105][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:54:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) shutdown(r1, 0x0) 00:54:22 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x3, 0x13, 0x100000000000000, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff06}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 1079.751149][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1079.757081][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:54:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 00:54:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x3, 0x13, 0x100000000000000, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff06}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:54:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) shutdown(r1, 0x0) 00:54:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = socket(0x11, 0x80803, 0x6) bind$pptp(r2, &(0x7f0000000200)={0x18, 0x2, {0x3, @rand_addr=0x7}}, 0x1e) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, 0x0, 0x10000024c) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) getpeername$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f0000000280)=0x10) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1e, 0x1, 0x0) sendmsg(r3, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x111ed0) close(r3) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) 00:54:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x3, 0x13, 0x100000000000000, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff06}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:54:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) 00:54:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) [ 1081.432604][T12924] Bluetooth: hci0: command 0xfc11 tx timeout [ 1081.439169][T13195] Bluetooth: hci0: Entering manufacturer mode failed (-110) [ 1083.511110][T26697] Bluetooth: hci0: command 0xfc11 tx timeout [ 1083.517313][T13195] Bluetooth: hci0: Entering manufacturer mode failed (-110) 00:54:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000009) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000200)=0x2) 00:54:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) 00:54:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 00:54:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = socket(0x11, 0x80803, 0x6) bind$pptp(r2, &(0x7f0000000200)={0x18, 0x2, {0x3, @rand_addr=0x7}}, 0x1e) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, 0x0, 0x10000024c) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) getpeername$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f0000000280)=0x10) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1e, 0x1, 0x0) sendmsg(r3, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x111ed0) close(r3) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) 00:54:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) 00:54:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) 00:54:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) [ 1083.761113][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1083.767014][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:54:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) 00:54:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = socket(0x11, 0x80803, 0x6) bind$pptp(r2, &(0x7f0000000200)={0x18, 0x2, {0x3, @rand_addr=0x7}}, 0x1e) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, 0x0, 0x10000024c) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) getpeername$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f0000000280)=0x10) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1e, 0x1, 0x0) sendmsg(r3, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x111ed0) close(r3) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) 00:54:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) 00:54:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000009) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000200)=0x2) 00:54:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = socket(0x11, 0x80803, 0x6) bind$pptp(r2, &(0x7f0000000200)={0x18, 0x2, {0x3, @rand_addr=0x7}}, 0x1e) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, 0x0, 0x10000024c) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) getpeername$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f0000000280)=0x10) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1e, 0x1, 0x0) sendmsg(r3, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x111ed0) close(r3) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) [ 1084.391321][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1084.397245][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1085.751117][T26697] Bluetooth: hci0: command 0xfc11 tx timeout [ 1085.757369][T13195] Bluetooth: hci0: Entering manufacturer mode failed (-110) 00:54:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000009) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000200)=0x2) 00:54:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x293b5}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) recvfrom$netrom(r1, &(0x7f0000000700)=""/207, 0xcf, 0x2040, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x7, 0x8000]) 00:54:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = socket(0x11, 0x80803, 0x6) bind$pptp(r2, &(0x7f0000000200)={0x18, 0x2, {0x3, @rand_addr=0x7}}, 0x1e) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, 0x0, 0x10000024c) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) getpeername$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f0000000280)=0x10) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1e, 0x1, 0x0) sendmsg(r3, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x111ed0) close(r3) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) 00:54:28 executing program 5: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) shutdown(r1, 0x0) 00:54:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\xb8\x86\xa8l\xd1\x05\x00\x00\x00.\x91\x87\x89\x00@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) r1 = socket$inet6(0xa, 0x803, 0x3) syz_open_dev$audion(0x0, 0x6, 0x200000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) close(r0) [ 1085.952253][T17074] Bluetooth: hci0: Frame reassembly failed (-84) [ 1085.992632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1085.999460][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1086.017920][ T484] bridge0: port 2(bridge_slave_1) entered disabled state [ 1086.025328][ T484] bridge0: port 1(bridge_slave_0) entered disabled state [ 1086.071139][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1086.077022][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:54:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = socket(0x11, 0x80803, 0x6) bind$pptp(r2, &(0x7f0000000200)={0x18, 0x2, {0x3, @rand_addr=0x7}}, 0x1e) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, 0x0, 0x10000024c) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) getpeername$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f0000000280)=0x10) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x1e, 0x1, 0x0) sendmsg(r3, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x111ed0) close(r3) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) [ 1086.151201][T15195] Bluetooth: hci1: Entering manufacturer mode failed (-110) 00:54:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000009) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000200)=0x2) 00:54:29 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) write$P9_RRENAME(r0, &(0x7f0000000200)={0xffffffffffffff2e}, 0x7) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1086.429899][ T489] bridge0: port 2(bridge_slave_1) entered blocking state [ 1086.437515][ T489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1086.447338][ T489] bridge0: port 1(bridge_slave_0) entered blocking state [ 1086.455196][ T489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1086.495678][ T489] device bridge0 entered promiscuous mode 00:54:29 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x3) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18}, 0x18) 00:54:29 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) write$P9_RRENAME(r0, &(0x7f0000000200)={0xffffffffffffff2e}, 0x7) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:54:29 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x3) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18}, 0x18) [ 1086.899542][ T490] can: notifier: receive list not found for dev ¸†¨lÑ 00:54:30 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x3) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18}, 0x18) [ 1086.953339][ T489] can: notifier: receive list not found for dev ¸†¨lÑ [ 1087.048659][ T503] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.055901][ T503] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.117707][ T503] device bridge0 left promiscuous mode [ 1087.462872][ T504] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.469985][ T504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1087.477425][ T504] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.484575][ T504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1087.557013][ T504] device bridge0 entered promiscuous mode [ 1087.582854][ T7806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1087.991113][ T7806] Bluetooth: hci0: command 0xfc11 tx timeout [ 1087.991152][T13195] Bluetooth: hci0: Entering manufacturer mode failed (-110) 00:54:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000009) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000200)=0x2) 00:54:31 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) write$P9_RRENAME(r0, &(0x7f0000000200)={0xffffffffffffff2e}, 0x7) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:54:31 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x3) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18}, 0x18) [ 1088.551405][ T7809] Bluetooth: hci1: command 0xfc11 tx timeout [ 1088.555674][T15195] Bluetooth: hci1: Entering manufacturer mode failed (-110) 00:54:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) shutdown(r1, 0x0) 00:54:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\xb8\x86\xa8l\xd1\x05\x00\x00\x00.\x91\x87\x89\x00@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) r1 = socket$inet6(0xa, 0x803, 0x3) syz_open_dev$audion(0x0, 0x6, 0x200000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) close(r0) 00:54:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") 00:54:32 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) write$P9_RRENAME(r0, &(0x7f0000000200)={0xffffffffffffff2e}, 0x7) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:54:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000009) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000200)=0x2) 00:54:32 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0ad401003c123f319bd070") syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x9, 0x4}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 1089.053212][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.060470][ T531] bridge0: port 1(bridge_slave_0) entered disabled state 00:54:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r2) close(r3) pipe(&(0x7f0000000100)) splice(r0, 0x0, r3, 0x0, 0xc0, 0x0) shutdown(r1, 0x0) 00:54:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000017c0)="230000005e00d3287b9e5e102641c74fc385326e0c00000050f85e62987e81aea30018", 0x23}], 0x1}, 0x0) [ 1089.140659][ T531] device bridge0 left promiscuous mode 00:54:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x80084504, &(0x7f0000000200)=0xfdfdffff) [ 1089.729044][ T537] bridge0: port 2(bridge_slave_1) entered blocking state [ 1089.736958][ T537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1089.746352][ T537] bridge0: port 1(bridge_slave_0) entered blocking state [ 1089.754004][ T537] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1089.829832][ T537] device bridge0 entered promiscuous mode [ 1089.976675][ T539] can: notifier: receive list not found for dev ¸†¨lÑ [ 1090.151265][T13195] Bluetooth: hci0: Entering manufacturer mode failed (-110) 00:54:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) 00:54:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 00:54:33 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0ad401003c123f319bd070") syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x9, 0x4}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 00:54:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x80084504, &(0x7f0000000200)=0xfdfdffff) 00:54:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\xb8\x86\xa8l\xd1\x05\x00\x00\x00.\x91\x87\x89\x00@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) r1 = socket$inet6(0xa, 0x803, 0x3) syz_open_dev$audion(0x0, 0x6, 0x200000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) close(r0) 00:54:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="c2544a4a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}], 0x1}}], 0x1, 0x0, 0x0) 00:54:33 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0ad401003c123f319bd070") syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x9, 0x4}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 00:54:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) [ 1090.348021][ T562] bridge0: port 2(bridge_slave_1) entered disabled state [ 1090.355384][ T562] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.376147][ T562] device bridge0 left promiscuous mode 00:54:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="c2544a4a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}], 0x1}}], 0x1, 0x0, 0x0) 00:54:33 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0ad401003c123f319bd070") syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x9, 0x4}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 00:54:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="c2544a4a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}], 0x1}}], 0x1, 0x0, 0x0) 00:54:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x80084504, &(0x7f0000000200)=0xfdfdffff) 00:54:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 00:54:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="c2544a4a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}], 0x1}}], 0x1, 0x0, 0x0) 00:54:33 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 00:54:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) [ 1090.948849][ T570] bridge0: port 2(bridge_slave_1) entered blocking state [ 1090.956601][ T570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1090.965832][ T570] bridge0: port 1(bridge_slave_0) entered blocking state [ 1090.973615][ T570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1091.036506][ T570] device bridge0 entered promiscuous mode [ 1091.123726][ T573] can: notifier: receive list not found for dev ¸†¨lÑ [ 1091.133659][ T7806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:54:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\xb8\x86\xa8l\xd1\x05\x00\x00\x00.\x91\x87\x89\x00@\x00', 0xc201}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) r1 = socket$inet6(0xa, 0x803, 0x3) syz_open_dev$audion(0x0, 0x6, 0x200000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00'}) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) close(r0) 00:54:34 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 00:54:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) 00:54:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x80084504, &(0x7f0000000200)=0xfdfdffff) 00:54:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 00:54:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 00:54:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) 00:54:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 00:54:34 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 00:54:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) 00:54:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) [ 1091.544394][ T614] bridge0: port 2(bridge_slave_1) entered disabled state [ 1091.551916][ T614] bridge0: port 1(bridge_slave_0) entered disabled state [ 1091.572312][ T614] device bridge0 left promiscuous mode 00:54:34 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2) [ 1092.012904][ T622] bridge0: port 2(bridge_slave_1) entered blocking state [ 1092.020329][ T622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1092.030094][ T622] bridge0: port 1(bridge_slave_0) entered blocking state [ 1092.038324][ T622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1092.098628][ T622] device bridge0 entered promiscuous mode [ 1092.143102][ T629] can: notifier: receive list not found for dev ¸†¨lÑ 00:54:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) 00:54:35 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2000000000000805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) accept4(r1, 0x0, 0x0, 0x0) 00:54:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000100)="f3e100def9575cc3b7d991d6734e4e73224a460f30096ccc2e67660e50e94d00c9c966440f38082173294ad0d26c4507c422f18cf0bf420fae9972b571b99f01467785fb") r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) lstat(0x0, &(0x7f00000006c0)) mkdir(&(0x7f0000000600)='./file0\x00', 0x40) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) fstat(0xffffffffffffffff, 0x0) accept4(r1, 0x0, &(0x7f00000005c0), 0x0) 00:54:35 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2) 00:54:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) 00:54:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) 00:54:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123d319bd070") futex(&(0x7f0000000100), 0x5, 0x2, 0x0, &(0x7f0000000080), 0xffffffffffffffff) [ 1092.515164][ T653] futex_wake_op: syz-executor.0 tries to shift op by -1; fix this program [ 1092.591860][ T656] futex_wake_op: syz-executor.0 tries to shift op by -1; fix this program 00:54:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123d319bd070") futex(&(0x7f0000000100), 0x5, 0x2, 0x0, &(0x7f0000000080), 0xffffffffffffffff) 00:54:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) 00:54:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000100)="f3e100def9575cc3b7d991d6734e4e73224a460f30096ccc2e67660e50e94d00c9c966440f38082173294ad0d26c4507c422f18cf0bf420fae9972b571b99f01467785fb") r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) lstat(0x0, &(0x7f00000006c0)) mkdir(&(0x7f0000000600)='./file0\x00', 0x40) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) fstat(0xffffffffffffffff, 0x0) accept4(r1, 0x0, &(0x7f00000005c0), 0x0) 00:54:35 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2) [ 1092.802334][ T662] futex_wake_op: syz-executor.0 tries to shift op by -1; fix this program 00:54:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123d319bd070") futex(&(0x7f0000000100), 0x5, 0x2, 0x0, &(0x7f0000000080), 0xffffffffffffffff) 00:54:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) [ 1093.005838][ T674] futex_wake_op: syz-executor.0 tries to shift op by -1; fix this program 00:54:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) 00:54:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) 00:54:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123d319bd070") futex(&(0x7f0000000100), 0x5, 0x2, 0x0, &(0x7f0000000080), 0xffffffffffffffff) 00:54:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000100)="f3e100def9575cc3b7d991d6734e4e73224a460f30096ccc2e67660e50e94d00c9c966440f38082173294ad0d26c4507c422f18cf0bf420fae9972b571b99f01467785fb") r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) lstat(0x0, &(0x7f00000006c0)) mkdir(&(0x7f0000000600)='./file0\x00', 0x40) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) fstat(0xffffffffffffffff, 0x0) accept4(r1, 0x0, &(0x7f00000005c0), 0x0) 00:54:36 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2) [ 1093.284394][ T682] futex_wake_op: syz-executor.0 tries to shift op by -1; fix this program 00:54:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000100)="f3e100def9575cc3b7d991d6734e4e73224a460f30096ccc2e67660e50e94d00c9c966440f38082173294ad0d26c4507c422f18cf0bf420fae9972b571b99f01467785fb") r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) lstat(0x0, &(0x7f00000006c0)) mkdir(&(0x7f0000000600)='./file0\x00', 0x40) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) fstat(0xffffffffffffffff, 0x0) accept4(r1, 0x0, &(0x7f00000005c0), 0x0) 00:54:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) 00:54:36 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x6) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=""/65) 00:54:36 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) memfd_create(0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) 00:54:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000100)="f3e100def9575cc3b7d991d6734e4e73224a460f30096ccc2e67660e50e94d00c9c966440f38082173294ad0d26c4507c422f18cf0bf420fae9972b571b99f01467785fb") r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) lstat(0x0, &(0x7f00000006c0)) mkdir(&(0x7f0000000600)='./file0\x00', 0x40) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) fstat(0xffffffffffffffff, 0x0) accept4(r1, 0x0, &(0x7f00000005c0), 0x0) 00:54:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000100)="f3e100def9575cc3b7d991d6734e4e73224a460f30096ccc2e67660e50e94d00c9c966440f38082173294ad0d26c4507c422f18cf0bf420fae9972b571b99f01467785fb") r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) lstat(0x0, &(0x7f00000006c0)) mkdir(&(0x7f0000000600)='./file0\x00', 0x40) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) fstat(0xffffffffffffffff, 0x0) accept4(r1, 0x0, &(0x7f00000005c0), 0x0) 00:54:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000000)={0x9, 0x20000000001, '\v'}, 0x300) 00:54:37 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000080)={0xa, 0x0, 0x2, {0x0, 0x0, 0x7}}) 00:54:37 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000080)={0xa, 0x0, 0x2, {0x0, 0x0, 0x7}}) 00:54:37 executing program 5: capget(&(0x7f00000006c0)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000700)) 00:54:37 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) mprotect(&(0x7f0000f14000/0x1000)=nil, 0x1000, 0x0) ioctl$int_out(r0, 0xa000000001, &(0x7f0000fd3ffc)) 00:54:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) prlimit64(0x0, 0x9, &(0x7f00000000c0), 0x0) syz_execute_func(&(0x7f0000000100)="f3e100def9575cc3b7d991d6734e4e73224a460f30096ccc2e67660e50e94d00c9c966440f38082173294ad0d26c4507c422f18cf0bf420fae9972b571b99f01467785fb") r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) lstat(0x0, &(0x7f00000006c0)) mkdir(&(0x7f0000000600)='./file0\x00', 0x40) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, 0x0, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, 0x0, 0x0) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) fstat(0xffffffffffffffff, 0x0) accept4(r1, 0x0, &(0x7f00000005c0), 0x0) 00:54:37 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000080)={0xa, 0x0, 0x2, {0x0, 0x0, 0x7}}) 00:54:37 executing program 5: capget(&(0x7f00000006c0)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000700)) 00:54:39 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) mprotect(&(0x7f0000f14000/0x1000)=nil, 0x1000, 0x0) ioctl$int_out(r0, 0xa000000001, &(0x7f0000fd3ffc)) 00:54:39 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000080)={0xa, 0x0, 0x2, {0x0, 0x0, 0x7}}) 00:54:39 executing program 5: capget(&(0x7f00000006c0)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000700)) 00:54:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047451, &(0x7f0000000100)) 00:54:39 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:39 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:39 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:39 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) mprotect(&(0x7f0000f14000/0x1000)=nil, 0x1000, 0x0) ioctl$int_out(r0, 0xa000000001, &(0x7f0000fd3ffc)) 00:54:39 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:39 executing program 5: capget(&(0x7f00000006c0)={0x19980330, 0xffffffffffffffff}, &(0x7f0000000700)) 00:54:39 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:39 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) mprotect(&(0x7f0000f14000/0x1000)=nil, 0x1000, 0x0) ioctl$int_out(r0, 0xa000000001, &(0x7f0000fd3ffc)) 00:54:39 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000000000000010000000f0000000b5250f91c4d2075f5ea48edb5b66eee3ad1489acfef89fff1a6de756549873c4d755bbde1d509a01c48912daffbf423e2890e57f6b0f251e565c4b716326abffa2b25b3533c5321fdb416a023e3523dd2d5b0622f6d9d166146facfbb09aa1b2447020e7649fe9381830dacb082c9820479f9d0dcef3ea1866a3248e59c31e6fe2b109eb385f4135429c79f7a79199b9f5ff7b5d3939a3d9b7900372d4915f8f2cfde3f07ac19d8bb501f478ea918f243008b426d9fef0ee1e32cba786d390653b07a957a635264bf487f4a3eb2c47a27f7ff3aea72be5c55ad44a76010007a7747163c4843e673dfe317c2ef5a1debcb78a64b47e1c6b8959ca0462a1c599451e9633b5ae83c77e8a44b2b507aeb4ade6117c591dd7915735d5611ec5f8add67bd7b70f7731748a03b90c3000f67c2dfd92fa3297237c18810f13d9cfae19b812aea93de75fdc3be4895a"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000300)={0x0, {{0x2, 0x0, @dev}}}, 0x108) 00:54:42 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:42 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:42 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:42 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:42 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000080)=""/246) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000040)={0x0, 0x0}) 00:54:42 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000000000000010000000f0000000b5250f91c4d2075f5ea48edb5b66eee3ad1489acfef89fff1a6de756549873c4d755bbde1d509a01c48912daffbf423e2890e57f6b0f251e565c4b716326abffa2b25b3533c5321fdb416a023e3523dd2d5b0622f6d9d166146facfbb09aa1b2447020e7649fe9381830dacb082c9820479f9d0dcef3ea1866a3248e59c31e6fe2b109eb385f4135429c79f7a79199b9f5ff7b5d3939a3d9b7900372d4915f8f2cfde3f07ac19d8bb501f478ea918f243008b426d9fef0ee1e32cba786d390653b07a957a635264bf487f4a3eb2c47a27f7ff3aea72be5c55ad44a76010007a7747163c4843e673dfe317c2ef5a1debcb78a64b47e1c6b8959ca0462a1c599451e9633b5ae83c77e8a44b2b507aeb4ade6117c591dd7915735d5611ec5f8add67bd7b70f7731748a03b90c3000f67c2dfd92fa3297237c18810f13d9cfae19b812aea93de75fdc3be4895a"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:43 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000000000000010000000f0000000b5250f91c4d2075f5ea48edb5b66eee3ad1489acfef89fff1a6de756549873c4d755bbde1d509a01c48912daffbf423e2890e57f6b0f251e565c4b716326abffa2b25b3533c5321fdb416a023e3523dd2d5b0622f6d9d166146facfbb09aa1b2447020e7649fe9381830dacb082c9820479f9d0dcef3ea1866a3248e59c31e6fe2b109eb385f4135429c79f7a79199b9f5ff7b5d3939a3d9b7900372d4915f8f2cfde3f07ac19d8bb501f478ea918f243008b426d9fef0ee1e32cba786d390653b07a957a635264bf487f4a3eb2c47a27f7ff3aea72be5c55ad44a76010007a7747163c4843e673dfe317c2ef5a1debcb78a64b47e1c6b8959ca0462a1c599451e9633b5ae83c77e8a44b2b507aeb4ade6117c591dd7915735d5611ec5f8add67bd7b70f7731748a03b90c3000f67c2dfd92fa3297237c18810f13d9cfae19b812aea93de75fdc3be4895a"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:43 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000000000000010000000f0000000b5250f91c4d2075f5ea48edb5b66eee3ad1489acfef89fff1a6de756549873c4d755bbde1d509a01c48912daffbf423e2890e57f6b0f251e565c4b716326abffa2b25b3533c5321fdb416a023e3523dd2d5b0622f6d9d166146facfbb09aa1b2447020e7649fe9381830dacb082c9820479f9d0dcef3ea1866a3248e59c31e6fe2b109eb385f4135429c79f7a79199b9f5ff7b5d3939a3d9b7900372d4915f8f2cfde3f07ac19d8bb501f478ea918f243008b426d9fef0ee1e32cba786d390653b07a957a635264bf487f4a3eb2c47a27f7ff3aea72be5c55ad44a76010007a7747163c4843e673dfe317c2ef5a1debcb78a64b47e1c6b8959ca0462a1c599451e9633b5ae83c77e8a44b2b507aeb4ade6117c591dd7915735d5611ec5f8add67bd7b70f7731748a03b90c3000f67c2dfd92fa3297237c18810f13d9cfae19b812aea93de75fdc3be4895a"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:43 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910500000b000f0035020000060000001900154006000001d40000dc1338d54400009b84136ef75afb83de44110016000d0003000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 00:54:43 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) [ 1100.066983][ T813] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 1100.089252][ T813] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 1100.138961][ T813] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 00:54:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='cifs.spnego\x00', &(0x7f0000000340)='/dev/qat_adf_ctl\x00') 00:54:43 executing program 4: clone(0x2102407ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') exit(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) fchdir(r0) 00:54:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10) close(r1) 00:54:43 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910500000b000f0035020000060000001900154006000001d40000dc1338d54400009b84136ef75afb83de44110016000d0003000000060cec4faba7d4", 0x55}], 0x1}, 0x0) [ 1100.395940][ T832] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 1100.438739][ T832] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 1100.475616][ T832] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 00:54:43 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x1, 0x0) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f0000000300)={0x6, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r5 = open(0x0, 0x2000, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000280)) r6 = socket$alg(0x26, 0x5, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x2) bind$alg(r6, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000380), &(0x7f00000003c0)=0x18e) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x750, {0x2, 0xfffffffffffffffc, @dev}, {0x2, 0x0, @remote}, {0x2, 0x6, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe, 0x3f00, 0x0, 0x1000, 0x0, 0x2000}) r7 = gettid() ptrace(0x80400008, r7) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000400)={0x10000014}) kcmp$KCMP_EPOLL_TFD(r7, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) write$cgroup_subtree(r0, 0x0, 0x0) 00:54:43 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:54:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='cifs.spnego\x00', &(0x7f0000000340)='/dev/qat_adf_ctl\x00') 00:54:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x7ff, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 00:54:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10) close(r1) 00:54:43 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910500000b000f0035020000060000001900154006000001d40000dc1338d54400009b84136ef75afb83de44110016000d0003000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 00:54:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='cifs.spnego\x00', &(0x7f0000000340)='/dev/qat_adf_ctl\x00') 00:54:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10) close(r1) 00:54:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x7ff, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) [ 1100.681612][ T851] netlink: 'syz-executor.0': attribute type 15 has an invalid length. 00:54:43 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:54:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='cifs.spnego\x00', &(0x7f0000000340)='/dev/qat_adf_ctl\x00') [ 1100.726629][ T851] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 1100.748474][ T851] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 00:54:44 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910500000b000f0035020000060000001900154006000001d40000dc1338d54400009b84136ef75afb83de44110016000d0003000000060cec4faba7d4", 0x55}], 0x1}, 0x0) [ 1100.960566][ T869] netlink: 'syz-executor.0': attribute type 15 has an invalid length. 00:54:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x7ff, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 00:54:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x7ff, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 00:54:44 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1101.031210][ T869] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 1101.039630][ T869] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 00:54:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10) close(r1) 00:54:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10) close(r1) 00:54:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x7ff, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 00:54:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x7ff, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 00:54:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xf24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffff7, 0xfffffffffffff2e1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6dfd4a94, 0x0, 0x10001, 0x0, 0x0, 0xe5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, 0x0) 00:54:44 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:54:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x801, 0x0, 0x0, {0x4, 0x2}}, 0x14}}, 0x0) 00:54:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x40000000a, 0x3, 0x7ff, 0x3}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2}, 0x2c) 00:54:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x801, 0x0, 0x0, {0x4, 0x2}}, 0x14}}, 0x0) 00:54:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f00000000c0)) 00:54:44 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_int(r0, 0x1, 0xb, 0x0, &(0x7f0000000040)) 00:54:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="a84a2ae92c431c850f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e29c03030fb8c40b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f6af3e6766f2ab38e3440fec3facacc4c3214cb9a5604b19c2f2adf08171a3038a82166e6e0f542c3d271c0000a80dd4d48f6978d25debe8628f480864360fe25800218de3c0f526264788fe49c4f6a1dd7dbbbfdd5cf65cf6c649bedcdca1c9fb110f66474f383ae34b9fb7e2") 00:54:44 executing program 4: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x10) socket$key(0xf, 0x3, 0x2) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000380)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 00:54:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10) close(r1) 00:54:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xf24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffff7, 0xfffffffffffff2e1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6dfd4a94, 0x0, 0x10001, 0x0, 0x0, 0xe5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, 0x0) 00:54:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x801, 0x0, 0x0, {0x4, 0x2}}, 0x14}}, 0x0) 00:54:44 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_int(r0, 0x1, 0xb, 0x0, &(0x7f0000000040)) [ 1101.747273][ T26] audit: type=1804 audit(3284.874:231): pid=919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir493256102/syzkaller.ZoY9CW/1469/file0/memory.events" dev="overlay" ino=123336 res=1 00:54:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x801, 0x0, 0x0, {0x4, 0x2}}, 0x14}}, 0x0) 00:54:45 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_int(r0, 0x1, 0xb, 0x0, &(0x7f0000000040)) 00:54:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xf24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffff7, 0xfffffffffffff2e1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6dfd4a94, 0x0, 0x10001, 0x0, 0x0, 0xe5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, 0x0) 00:54:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10) close(r1) 00:54:45 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$sock_int(r0, 0x1, 0xb, 0x0, &(0x7f0000000040)) 00:54:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xf24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffff7, 0xfffffffffffff2e1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6dfd4a94, 0x0, 0x10001, 0x0, 0x0, 0xe5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, 0x0) 00:54:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x35efff7f) [ 1102.605032][ T26] audit: type=1804 audit(3285.734:232): pid=956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir493256102/syzkaller.ZoY9CW/1469/file0/file0/memory.events" dev="overlay" ino=123368 res=1 00:54:45 executing program 4: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x10) socket$key(0xf, 0x3, 0x2) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000380)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 00:54:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xf24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffff7, 0xfffffffffffff2e1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6dfd4a94, 0x0, 0x10001, 0x0, 0x0, 0xe5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, 0x0) 00:54:45 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)) 00:54:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000340)="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", 0x4c1, 0xfffffffffffffffd) keyctl$read(0x3, r1, 0x0, 0xffffffffffffffd5) 00:54:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x35efff7f) 00:54:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xf24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffff7, 0xfffffffffffff2e1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6dfd4a94, 0x0, 0x10001, 0x0, 0x0, 0xe5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, 0x0) 00:54:46 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)) 00:54:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x35efff7f) [ 1103.114307][ T26] audit: type=1804 audit(3286.244:233): pid=980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir493256102/syzkaller.ZoY9CW/1470/file0/memory.events" dev="overlay" ino=123401 res=1 00:54:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000340)="46ac5128da090e4899c38028efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c16c5c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec2b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0x4c1, 0xfffffffffffffffd) keyctl$read(0x3, r1, 0x0, 0xffffffffffffffd5) 00:54:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:54:46 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)) 00:54:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:54:47 executing program 4: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x10) socket$key(0xf, 0x3, 0x2) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000380)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 00:54:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x35efff7f) 00:54:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xf24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffff7, 0xfffffffffffff2e1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6dfd4a94, 0x0, 0x10001, 0x0, 0x0, 0xe5, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0xc0189436, 0x0) 00:54:47 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x19, 0x0, &(0x7f0000000040)) 00:54:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:54:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000340)="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", 0x4c1, 0xfffffffffffffffd) keyctl$read(0x3, r1, 0x0, 0xffffffffffffffd5) 00:54:47 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) readv(r0, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/227, 0xe3}, {&(0x7f00000003c0)=""/191, 0xbf}], 0x2) 00:54:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x2, 0x5, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:54:47 executing program 5: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:47 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r0, 0x0, 0x0) [ 1104.176208][ T26] audit: type=1804 audit(3287.304:234): pid=1020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir493256102/syzkaller.ZoY9CW/1471/file0/memory.events" dev="overlay" ino=123446 res=1 00:54:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r1}], 0x1, 0x4) 00:54:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f9af6a8a4ca4528043858dd1fe6e8230ea59cff2b"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) [ 1104.909581][ T1054] IPVS: ftp: loaded support on port[0] = 21 00:54:48 executing program 4: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x10) socket$key(0xf, 0x3, 0x2) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000380)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 00:54:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000340)="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", 0x4c1, 0xfffffffffffffffd) keyctl$read(0x3, r1, 0x0, 0xffffffffffffffd5) 00:54:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r1}], 0x1, 0x4) 00:54:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x0, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0xf) wait4(0x0, 0x0, 0x40000000, 0x0) 00:54:48 executing program 5: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r1}], 0x1, 0x4) 00:54:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x0, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0xf) wait4(0x0, 0x0, 0x40000000, 0x0) [ 1105.392941][ T26] audit: type=1804 audit(3288.524:235): pid=1069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir493256102/syzkaller.ZoY9CW/1472/file0/memory.events" dev="overlay" ino=124550 res=1 00:54:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r1}], 0x1, 0x4) 00:54:48 executing program 2: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x0, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0xf) wait4(0x0, 0x0, 0x40000000, 0x0) 00:54:48 executing program 0: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f9af6a8a4ca4528043858dd1fe6e8230ea59cff2b"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:54:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x0, 0x300) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0xf) wait4(0x0, 0x0, 0x40000000, 0x0) 00:54:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f9af6a8a4ca4528043858dd1fe6e8230ea59cff2b"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:54:49 executing program 5: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:49 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000003440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="14000000000000000000000001"], 0xd}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x21}}], 0x2, 0x0) 00:54:49 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000003440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="14000000000000000000000001"], 0xd}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x21}}], 0x2, 0x0) 00:54:49 executing program 0: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:50 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000003440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="14000000000000000000000001"], 0xd}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x21}}], 0x2, 0x0) 00:54:50 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000003440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="14000000000000000000000001"], 0xd}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x21}}], 0x2, 0x0) 00:54:50 executing program 2: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:50 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x87e, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x810}, 0x80) unshare(0x40000000) [ 1107.338432][ T1153] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1107.490541][ T1153] FAT-fs (loop5): Filesystem has been set read-only [ 1107.624783][ T1134] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) [ 1107.680897][ T1134] FAT-fs (loop5): error, invalid access to FAT (entry 0x00006500) 00:54:50 executing program 0: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f9af6a8a4ca4528043858dd1fe6e8230ea59cff2b"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:54:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) llistxattr(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 00:54:53 executing program 5: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:53 executing program 2: syz_open_dev$usbmon(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05a7de154f3834df"], 0x19) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x5}]}) 00:54:53 executing program 0: creat(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file0\x00') 00:54:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f9af6a8a4ca4528043858dd1fe6e8230ea59cff2b"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:54:54 executing program 0: creat(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file0\x00') 00:54:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) llistxattr(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) [ 1111.052580][ T1185] IPVS: ftp: loaded support on port[0] = 21 00:54:54 executing program 0: creat(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file0\x00') 00:54:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) llistxattr(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 00:54:54 executing program 0: creat(&(0x7f0000000100)='./file1\x00', 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file0\x00') 00:54:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) llistxattr(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 00:54:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) 00:54:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f9af6a8a4ca4528043858dd1fe6e8230ea59cff2b"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:54:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 00:54:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f9af6a8a4ca4528043858dd1fe6e8230ea59cff2b"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:54:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bc070") 00:54:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) 00:54:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 00:54:55 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) write$ppp(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 00:54:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) 00:54:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 00:54:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000001b40)='t\bnu\x00\x00\x00\x7f\x00\x00\x8c\x00\x10\x00\x00\x00\x00\x00\x00N\x1c\xc3\xfe\xc3.\x12\x1e\xcc\xf2\xd8\xd5l\x04~K8\xff\xe1S\xfa\xc1\xbb\x8bx\x9e\v\x83\xf6\xb2q[\xfd\xd8\x8b\x1d7\xcc\xe9\x82\xe8Y\xda\xec\x02sh5\x8d\x90J\xd0v\tu@\x13\x94\xd3\xe2\x8d\xec\x914\xcaKy\xe9K\x9cP\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa1\xff\x96\xec\xf8\xcaJH\xef\xfc\n.}\x0fnvI\x83\xa5\xfc\xd3\xe4(\xa7&\xab\xd2\xd5\x90\x87\xea\xddO\x1f\xff\x00\x00\x00\xdd\xb1\xc6\xae\x0f\xb6\xfcEq\xc3\xe6p\x95\xc7x\x91\x9c\xf4\x10W\xfd\xea\xb3|\xa1\xb0M\x06C\xf1\xb5\xc3\x8a\xaf\x1b\x98\xc9c6\x13\xa6\x94\x14', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) 00:54:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) 00:54:55 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @broadcast, @empty=0x2000000, @dev, @local}}}}, 0x0) 00:54:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x4, 0x100000001, 0x8000000001}, 0xf) bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:54:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 00:54:59 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) write$ppp(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 00:54:59 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @broadcast, @empty=0x2000000, @dev, @local}}}}, 0x0) 00:54:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 00:54:59 executing program 3: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 00:54:59 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @broadcast, @empty=0x2000000, @dev, @local}}}}, 0x0) [ 1116.219084][ T1277] block nbd0: shutting down sockets 00:54:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x200000e3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x40000000089f5, &(0x7f0000000000)={'eql\x00\x00\x00\x01\x045\x00', @ifru_flags}) 00:54:59 executing program 4: r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) kcmp(r0, r0, 0x0, r1, 0xffffffffffffffff) 00:54:59 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @broadcast, @empty=0x2000000, @dev, @local}}}}, 0x0) 00:54:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x4, 0x100000001, 0x8000000001}, 0xf) bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:54:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x200000e3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x40000000089f5, &(0x7f0000000000)={'eql\x00\x00\x00\x01\x045\x00', @ifru_flags}) 00:54:59 executing program 4: r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) kcmp(r0, r0, 0x0, r1, 0xffffffffffffffff) 00:54:59 executing program 4: r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) kcmp(r0, r0, 0x0, r1, 0xffffffffffffffff) 00:54:59 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) write$ppp(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 00:54:59 executing program 3: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 00:54:59 executing program 0: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 00:54:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x200000e3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x40000000089f5, &(0x7f0000000000)={'eql\x00\x00\x00\x01\x045\x00', @ifru_flags}) 00:54:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x4, 0x100000001, 0x8000000001}, 0xf) bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:54:59 executing program 4: r0 = gettid() r1 = socket$nl_route(0x10, 0x3, 0x0) kcmp(r0, r0, 0x0, r1, 0xffffffffffffffff) [ 1116.758994][ T1311] block nbd0: shutting down sockets 00:54:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x200000e3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x40000000089f5, &(0x7f0000000000)={'eql\x00\x00\x00\x01\x045\x00', @ifru_flags}) 00:54:59 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b1001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 1116.842301][ T1319] block nbd0: Device being setup by another task 00:55:00 executing program 0: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 00:55:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000040)="9877774a2ae92cb81c030f05bf02000000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 00:55:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x4, 0x100000001, 0x8000000001}, 0xf) bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1116.972192][ T1332] block nbd0: Device being setup by another task 00:55:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b1001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 00:55:00 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) write$ppp(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 00:55:00 executing program 3: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 00:55:00 executing program 0: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 00:55:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000040)="9877774a2ae92cb81c030f05bf02000000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 00:55:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f323c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f0000000680)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000200)='./file0\x00') link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') llistxattr(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 00:55:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b1001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 1117.302869][ T1349] block nbd0: shutting down sockets 00:55:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b1001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 1117.366614][ T1354] block nbd0: Device being setup by another task 00:55:00 executing program 0: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x17fe, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RWALK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='%'], 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r3 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) tee(r3, r0, 0x20, 0x0) tee(r1, r3, 0x3, 0x0) 00:55:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xb, 0x5, 0x103}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) 00:55:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000040)="9877774a2ae92cb81c030f05bf02000000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 1117.538695][ T1369] overlayfs: './file0' not a directory 00:55:00 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) 00:55:00 executing program 3: r0 = socket(0x11, 0x3, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 00:55:00 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000002880)=[{&(0x7f0000000280)="1505a71c5e4b95c18e3cbfa5bc571ab22852f11d4bc627e31f124d090ca69d7ea517172468ebff622c785247d8f2f8f903b326eb76d1ade122ac1a0a0dcdd897f0b2b9c63a51921e6eb87ae19ee536eeb4fbd26670b56b24f8d84de63c67dc9d7e3804a4ae04c59e244c808617d0ffc5392d3d36ed0c87cf0d80733e216fb44132b7c10d4c8c3e53082a6202a3a9460627906e0bc005cd19832e4d376aa526563de1443e7fdd5d4efb6262fb79ead09bcde6afd05d", 0xb5}], 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 00:55:00 executing program 0: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x17fe, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RWALK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='%'], 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r3 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) tee(r3, r0, 0x20, 0x0) tee(r1, r3, 0x3, 0x0) 00:55:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f323c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f0000000680)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000200)='./file0\x00') link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') llistxattr(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) [ 1117.761916][ T1383] block nbd0: shutting down sockets 00:55:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000040)="9877774a2ae92cb81c030f05bf02000000c4a37bf0c55c41e2e92e363e460f1a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f88ac483397fd3fb0000c0c4a1662ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 00:55:01 executing program 0: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x17fe, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RWALK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='%'], 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r3 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) tee(r3, r0, 0x20, 0x0) tee(r1, r3, 0x3, 0x0) 00:55:01 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x17fe, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RWALK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='%'], 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r3 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) tee(r3, r0, 0x20, 0x0) tee(r1, r3, 0x3, 0x0) 00:55:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f0000000000)='/dev/ashmem\x00') 00:55:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f323c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f0000000680)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000200)='./file0\x00') link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') llistxattr(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 00:55:01 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x100, 0x4) r2 = fcntl$dupfd(r0, 0x0, r0) write$P9_RVERSION(r2, 0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x12020, 0x0, 0x0) 00:55:01 executing program 0: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x17fe, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RWALK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='%'], 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r3 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) tee(r3, r0, 0x20, 0x0) tee(r1, r3, 0x3, 0x0) 00:55:01 executing program 2: syz_execute_func(&(0x7f0000000140)="1c1bb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 00:55:01 executing program 4: syz_execute_func(&(0x7f0000000000)="952cd10f050520d0f807910c02298f17955bf95b3ed3a6085e00000fc4014cf23e26220fbff6000000a0e5bee7d1c4e1f8c421fc5122c1d72121c48192558dc3c36645c44298f2bc98130000009f5e3b01c50b01c50b0b003f3fbfce0f73d539c481f8521f572644a5f0470fbb7608a9c14600090fbdcbc461205ffb3e11bd110f0000") 00:55:01 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x100, 0x4) r2 = fcntl$dupfd(r0, 0x0, r0) write$P9_RVERSION(r2, 0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x12020, 0x0, 0x0) 00:55:01 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x17fe, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RWALK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='%'], 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r3 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) tee(r3, r0, 0x20, 0x0) tee(r1, r3, 0x3, 0x0) 00:55:01 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000000100), 0x8000261, 0x24000004) 00:55:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f323c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f0000000680)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000200)='./file0\x00') link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') llistxattr(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 00:55:01 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x100, 0x4) r2 = fcntl$dupfd(r0, 0x0, r0) write$P9_RVERSION(r2, 0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x12020, 0x0, 0x0) 00:55:01 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000000100), 0x8000261, 0x24000004) 00:55:01 executing program 2: syz_execute_func(&(0x7f0000000140)="1c1bb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 00:55:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:55:01 executing program 1: r0 = socket$inet6(0xa, 0x80803, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x100, 0x4) r2 = fcntl$dupfd(r0, 0x0, r0) write$P9_RVERSION(r2, 0x0, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x12020, 0x0, 0x0) 00:55:01 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x17fe, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RWALK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='%'], 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") r3 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) tee(r3, r0, 0x20, 0x0) tee(r1, r3, 0x3, 0x0) 00:55:01 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x1, 0x0, [], &(0x7f0000000040)={0x98f909, 0x0, [], @ptr}}) 00:55:01 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000000100), 0x8000261, 0x24000004) 00:55:01 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000000100), 0x8000261, 0x24000004) 00:55:01 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x1, 0x0, [], &(0x7f0000000040)={0x98f909, 0x0, [], @ptr}}) 00:55:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 00:55:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:02 executing program 2: syz_execute_func(&(0x7f0000000140)="1c1bb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") [ 1118.996355][ T1454] IPVS: ftp: loaded support on port[0] = 21 00:55:02 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x60006b, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 00:55:02 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x1, 0x0, [], &(0x7f0000000040)={0x98f909, 0x0, [], @ptr}}) [ 1119.661830][ T1454] IPVS: ftp: loaded support on port[0] = 21 00:55:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:55:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 00:55:02 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x1, 0x0, [], &(0x7f0000000040)={0x98f909, 0x0, [], @ptr}}) 00:55:02 executing program 2: syz_execute_func(&(0x7f0000000140)="1c1bb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 00:55:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 00:55:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:55:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 00:55:03 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:04 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x60006b, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 00:55:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:55:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:06 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x60006b, 0x0, 0x6031, 0xffffffffffffffff, 0x0) [ 1124.328870][ T1576] FS-Cache: Duplicate cookie detected [ 1124.334959][ T1576] FS-Cache: O-cookie c=00000000286c1f4c [p=0000000087df3410 fl=222 nc=0 na=1] [ 1124.344016][ T1576] FS-Cache: O-cookie d=00000000f0a094b2 n=00000000bbd724fe [ 1124.351353][ T1576] FS-Cache: O-key=[10] '0200020000a07f000008' [ 1124.357881][ T1576] FS-Cache: N-cookie c=0000000066b24319 [p=0000000087df3410 fl=2 nc=0 na=1] [ 1124.367375][ T1576] FS-Cache: N-cookie d=00000000f0a094b2 n=00000000410c0416 [ 1124.375001][ T1576] FS-Cache: N-key=[10] '0200020000a07f000008' 00:55:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 00:55:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 00:55:10 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x60006b, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 00:55:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) r1 = syz_open_dev$audion(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(r1, 0x409, 0x4) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x200000000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rt_sigtimedwait(&(0x7f0000000200)={0x7f}, &(0x7f0000000240), &(0x7f00000002c0)={0x0, 0x989680}, 0x8) 00:55:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:55:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:55:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) [ 1127.564573][ T1616] IPVS: ftp: loaded support on port[0] = 21 00:55:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 00:55:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 00:55:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 00:55:11 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x38}}, 0x0) 00:55:11 executing program 0: syz_emit_ethernet(0xfdf4, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8, 0x11}}}}}, &(0x7f0000000040)) 00:55:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$vsock(0xffffffffffffff9c, 0x0, 0x80100, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x90) r0 = openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0000200001000000000000000000000007ed8c1411380c61945f5ec9981b984ec62e2b32628f3a1ec080b502e0e83154d0db74dfca2d60efaa4c3f"], 0x1}}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 00:55:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x2b, 0x1}, 0x14}}, 0x0) 00:55:14 executing program 0: syz_emit_ethernet(0xfdf4, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8, 0x11}}}}}, &(0x7f0000000040)) 00:55:14 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x7fffffff, 0x3}}) 00:55:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x20000115}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 00:55:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x2b, 0x1}, 0x14}}, 0x0) 00:55:15 executing program 0: syz_emit_ethernet(0xfdf4, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8, 0x11}}}}}, &(0x7f0000000040)) 00:55:15 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x7fffffff, 0x3}}) 00:55:15 executing program 0: syz_emit_ethernet(0xfdf4, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8, 0x11}}}}}, &(0x7f0000000040)) 00:55:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x20000115}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 00:55:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x2b, 0x1}, 0x14}}, 0x0) [ 1132.129963][ T1673] IPVS: ftp: loaded support on port[0] = 21 00:55:15 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x7fffffff, 0x3}}) 00:55:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x2b, 0x1}, 0x14}}, 0x0) 00:55:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x20000115}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 00:55:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x20000115}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 00:55:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x20000115}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 00:55:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x20000115}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 00:55:16 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x7fffffff, 0x3}}) 00:55:16 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x3, 0x0) 00:55:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)=""/85, 0x20000115}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {0x0}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 00:55:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:55:17 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x0, 0x0) 00:55:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x11, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f00000000c0)={0x80323, 0x2}) [ 1133.900453][ T1756] e Filesystem requires source device 00:55:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000a40)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0) [ 1133.959228][ T1759] e Filesystem requires source device 00:55:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000a40)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0) 00:55:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff55f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r2, 0x1f, 0x2, r2}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x2, r3}) 00:55:17 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x0, 0x0) 00:55:17 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x0, 0x0) [ 1134.218366][ T1776] e Filesystem requires source device 00:55:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000a40)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0) 00:55:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:55:17 executing program 1: mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x0, 0x0) 00:55:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x11, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f00000000c0)={0x80323, 0x2}) [ 1134.393255][ T1784] e Filesystem requires source device 00:55:17 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24) [ 1134.527297][ T1796] e Filesystem requires source device 00:55:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000a40)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0) 00:55:17 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24) 00:55:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:18 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) msync(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4) 00:55:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:55:18 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24) 00:55:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x11, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f00000000c0)={0x80323, 0x2}) 00:55:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="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") 00:55:18 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) msync(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4) 00:55:18 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24) 00:55:18 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) msync(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4) 00:55:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) dup3(r0, r1, 0x0) 00:55:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 00:55:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x11, 0x2) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f00000000c0)={0x80323, 0x2}) 00:55:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) dup3(r0, r1, 0x0) 00:55:18 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x20000002812, r0, 0x0) msync(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4) 00:55:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) dup3(r0, r1, 0x0) 00:55:18 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="98c4212173d600c44205abe5774a2ae92c8b1cc60f05bf04004200c4a37bf0c55c41e2e9c4e26d911ce2b39ec4a1797ec8080000110f33b849c442748fc978820509000000c4c1e55cee4b26660f38091ee509c421dd5831c4e10bf8c45b64660f3838520a9ac40fe376659abd4877f582c42140547e67fbc44161d3a6000000000faac443390d560e00c4227d33f953c790906766f2ab0f0f12c4e17913a48f6f240000ce62b1f72ec3c4e2899294d80000000019c2c2b0c10b0bc4414e53d2c4816016f7a8d0b8d4d466456b3d8fc4c3dd7c984872fa668ed9af9aafd04e10106aa8308e4d88a588a500212de2c02cf5c4810dda360f1271005cffefffffdcbee0e0f04781007412b207810f9f9f474e493a3ed8fbfbe20d") 00:55:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) dup3(r0, r1, 0x0) 00:55:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x87}, {0x6}]}, 0x10) 00:55:19 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={'lo:\x05\xe6\xff\x01\x00', {0x2, 0x0, @broadcast}}) 00:55:19 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={'lo:\x05\xe6\xff\x01\x00', {0x2, 0x0, @broadcast}}) 00:55:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={'lo:\x05\xe6\xff\x01\x00', {0x2, 0x0, @broadcast}}) 00:55:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={'lo:\x05\xe6\xff\x01\x00', {0x2, 0x0, @broadcast}}) 00:55:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="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") 00:55:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x2, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/108, 0x6c}], 0x1) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) close(r0) syncfs(0xffffffffffffffff) 00:55:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x87}, {0x6}]}, 0x10) 00:55:20 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000002c0)=0x581, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000300)={@remote={[], 0x2}, 0x0, 'veth1_to_hsr\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x494, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x9) 00:55:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0xe00000, 0x297ef) 00:55:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x32, 0x0, 0x1ca) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x800000000000033) fcntl$setstatus(r1, 0x4, 0x42803) [ 1137.660171][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 1137.700541][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 1137.733366][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 1137.767697][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 1137.827533][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 00:55:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x87}, {0x6}]}, 0x10) [ 1137.870293][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 1137.921209][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 00:55:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000002fe8)=[{0x87}, {0x6}]}, 0x10) [ 1137.974592][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 1138.023760][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 00:55:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x8102) [ 1138.084918][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 1138.121808][T28900] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 00:55:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0xe00000, 0x297ef) 00:55:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0xe00000, 0x297ef) [ 1138.167000][T28900] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz1] on syz1 00:55:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xc8, &(0x7f0000000000), 0x4) close(r1) 00:55:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000080)="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") 00:55:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x2, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/108, 0x6c}], 0x1) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) close(r0) syncfs(0xffffffffffffffff) 00:55:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xc8, &(0x7f0000000000), 0x4) close(r1) 00:55:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0xe00000, 0x297ef) 00:55:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0xe00000, 0x297ef) [ 1138.800228][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1138.816384][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1138.857684][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1138.896468][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1138.921995][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1138.950107][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1138.975957][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1139.000822][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1139.034823][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1139.065206][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 00:55:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xc8, &(0x7f0000000000), 0x4) close(r1) 00:55:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xc8, &(0x7f0000000000), 0x4) close(r1) [ 1139.090366][T26697] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 1139.129588][T26697] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz1] on syz1 00:55:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0xe00000, 0x297ef) 00:55:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xc8, &(0x7f0000000000), 0x4) close(r1) 00:55:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x2, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/108, 0x6c}], 0x1) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) close(r0) syncfs(0xffffffffffffffff) 00:55:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xc8, &(0x7f0000000000), 0x4) close(r1) 00:55:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0xe00000, 0x297ef) [ 1139.405033][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.447115][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.498412][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.525409][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.547154][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.570045][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.587603][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.630665][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.652219][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.668290][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.679757][T26697] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 1139.710301][T26697] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz1] on syz1 00:55:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0xffffffff00000000, 0xc8, &(0x7f0000000000), 0x4) close(r1) 00:55:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000280)={0x7a, 0x0, [0x3a], [0xc1]}) 00:55:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup2(r1, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc018620c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0}) 00:55:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0xffe) 00:55:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x2, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/108, 0x6c}], 0x1) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) close(r0) syncfs(0xffffffffffffffff) 00:55:22 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000040)={0x20000000ffffffff, 0x0, "887f50c01146a9890837f8f8aa1766557bb0ba152dcac0994c00"}) 00:55:23 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001140)='/dev/cuse\x00', 0x2842, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)) 00:55:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) 00:55:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup2(r1, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc018620c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0}) [ 1139.994588][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 1140.024505][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 00:55:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_ROPEN(r1, &(0x7f0000000140)={0x7b, 0x12}, 0x18) [ 1140.070218][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 1140.100119][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 1140.123363][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 1140.149820][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 00:55:23 executing program 4: syz_execute_func(&(0x7f00000000c0)="4414b2b2b598cd801b69e4f56962f5696200d9d9d0c441395bf91cc18fc93892b9ffefffffe101edfec4660f380a8f050000007d82c4827d19bb00000000dfdfe4da764ff2168f580879bce0002edeebc4a2fd45e766f3e1dc470fbaaa3b02130b00c1ea013e9a7200000043e9f265dc5f001a6645363ef80f9966030faee42c24a1a1460f569f00082640c40153fe1d8b49df646736676666430fefb3000000007250314f8683d5b986450f1725f7454511f954111d04") [ 1140.167645][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 1140.190233][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 1140.207224][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 00:55:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup2(r1, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc018620c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0}) [ 1140.221954][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 1140.236172][T28900] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 00:55:23 executing program 2: syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x0) [ 1140.311436][T28900] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on syz1 00:55:23 executing program 4: syz_execute_func(&(0x7f00000000c0)="4414b2b2b598cd801b69e4f56962f5696200d9d9d0c441395bf91cc18fc93892b9ffefffffe101edfec4660f380a8f050000007d82c4827d19bb00000000dfdfe4da764ff2168f580879bce0002edeebc4a2fd45e766f3e1dc470fbaaa3b02130b00c1ea013e9a7200000043e9f265dc5f001a6645363ef80f9966030faee42c24a1a1460f569f00082640c40153fe1d8b49df646736676666430fefb3000000007250314f8683d5b986450f1725f7454511f954111d04") 00:55:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) 00:55:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x32f, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) dup3(r0, r1, 0x0) 00:55:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup2(r1, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc018620c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0}) 00:55:23 executing program 4: syz_execute_func(&(0x7f00000000c0)="4414b2b2b598cd801b69e4f56962f5696200d9d9d0c441395bf91cc18fc93892b9ffefffffe101edfec4660f380a8f050000007d82c4827d19bb00000000dfdfe4da764ff2168f580879bce0002edeebc4a2fd45e766f3e1dc470fbaaa3b02130b00c1ea013e9a7200000043e9f265dc5f001a6645363ef80f9966030faee42c24a1a1460f569f00082640c40153fe1d8b49df646736676666430fefb3000000007250314f8683d5b986450f1725f7454511f954111d04") 00:55:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_ROPEN(r1, &(0x7f0000000140)={0x7b, 0x12}, 0x18) 00:55:23 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200140002000000400000000000000005000600200000000a00000400000000000500e50000070000001f00000000000003000000000000020001008000000000000002000000000500050000009f000a0000ff17000000000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x32f0460fe8298b6, 0x0) 00:55:23 executing program 4: syz_execute_func(&(0x7f00000000c0)="4414b2b2b598cd801b69e4f56962f5696200d9d9d0c441395bf91cc18fc93892b9ffefffffe101edfec4660f380a8f050000007d82c4827d19bb00000000dfdfe4da764ff2168f580879bce0002edeebc4a2fd45e766f3e1dc470fbaaa3b02130b00c1ea013e9a7200000043e9f265dc5f001a6645363ef80f9966030faee42c24a1a1460f569f00082640c40153fe1d8b49df646736676666430fefb3000000007250314f8683d5b986450f1725f7454511f954111d04") 00:55:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_ROPEN(r1, &(0x7f0000000140)={0x7b, 0x12}, 0x18) 00:55:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0xf8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='GPL\x00', 0x1c4, 0x2fb, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:55:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) 00:55:24 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) semget$private(0x0, 0x0, 0x0) 00:55:24 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200140002000000400000000000000005000600200000000a00000400000000000500e50000070000001f00000000000003000000000000020001008000000000000002000000000500050000009f000a0000ff17000000000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x32f0460fe8298b6, 0x0) 00:55:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0xf8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='GPL\x00', 0x1c4, 0x2fb, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:55:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x32f, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) dup3(r0, r1, 0x0) 00:55:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0xf8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='GPL\x00', 0x1c4, 0x2fb, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:55:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) 00:55:24 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200140002000000400000000000000005000600200000000a00000400000000000500e50000070000001f00000000000003000000000000020001008000000000000002000000000500050000009f000a0000ff17000000000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x32f0460fe8298b6, 0x0) 00:55:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000280)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_ROPEN(r1, &(0x7f0000000140)={0x7b, 0x12}, 0x18) 00:55:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0xf8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x10000000}, [@map]}, &(0x7f0000000440)='GPL\x00', 0x1c4, 0x2fb, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:55:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x32f, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) dup3(r0, r1, 0x0) 00:55:24 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200140002000000400000000000000005000600200000000a00000400000000000500e50000070000001f00000000000003000000000000020001008000000000000002000000000500050000009f000a0000ff17000000000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x32f0460fe8298b6, 0x0) 00:55:24 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000200)={0x0, 0x1f, 0x0, 0x0}) 00:55:24 executing program 5: mknod(&(0x7f0000000080)='./bus\x00', 0x100c, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) splice(r0, &(0x7f00000000c0), r2, 0x0, 0x3ff, 0x0) 00:55:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x32f, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) dup3(r0, r1, 0x0) 00:55:25 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:55:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x32f, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) dup3(r0, r1, 0x0) 00:55:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r0, 0x1) syz_execute_func(&(0x7f0000000240)="95b03a0f050520d0f8079135358f17955bf95bf90fc4014cf23e26220f66410f6fc4a0e5be34d1c4e1f8c421fcd565660f79ea0f6eba0d8c7388dea10fbb019886000fbfce0f73d539c4c29d38a500000080c4c1f9f7c72644a58388b6b60fbb750cf24d0f2d96000000000fbdcbf3440f2b5501fb61205ffb3e11bd110f0000660f71f6a9") 00:55:25 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:55:25 executing program 5: mknod(&(0x7f0000000080)='./bus\x00', 0x100c, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) splice(r0, &(0x7f00000000c0), r2, 0x0, 0x3ff, 0x0) 00:55:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x7, 0x0, 0x7e}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x7, 0x1, 0x0, 0x1ab60000}, 0x14) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, 0x0) r3 = getpid() ioprio_set$pid(0x2, r3, 0x6) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r4 = open(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000001c0)={0x3cf8, 0x7, 0x0, 0x9, 0xfffffffffffffbff}, 0x14) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1142.137990][ T2087] md: invalid raid superblock magic on mtdblock0 [ 1142.200529][ T2087] md: mtdblock0 does not have a valid v0.0 superblock, not importing! [ 1142.258322][ T2087] md: md_import_device returned -22 00:55:25 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:55:25 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:55:25 executing program 5: mknod(&(0x7f0000000080)='./bus\x00', 0x100c, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) splice(r0, &(0x7f00000000c0), r2, 0x0, 0x3ff, 0x0) 00:55:25 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000200)={0x0, 0x1f, 0x0, 0x0}) 00:55:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x32f, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) dup3(r0, r1, 0x0) 00:55:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x32f, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) dup3(r0, r1, 0x0) 00:55:25 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @remote, [], {@arp={0x6558, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random='b?VT\b\x00', @empty, @local, @remote}}}}, 0x0) 00:55:25 executing program 5: mknod(&(0x7f0000000080)='./bus\x00', 0x100c, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) splice(r0, &(0x7f00000000c0), r2, 0x0, 0x3ff, 0x0) 00:55:26 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @remote, [], {@arp={0x6558, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random='b?VT\b\x00', @empty, @local, @remote}}}}, 0x0) 00:55:26 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000200)={0x0, 0x1f, 0x0, 0x0}) 00:55:26 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @remote, [], {@arp={0x6558, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random='b?VT\b\x00', @empty, @local, @remote}}}}, 0x0) [ 1143.156148][ T2150] md: invalid raid superblock magic on mtdblock0 [ 1143.188279][ T2150] md: mtdblock0 does not have a valid v0.0 superblock, not importing! [ 1143.236160][ T2150] md: md_import_device returned -22 00:55:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x7, 0x0, 0x7e}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x7, 0x1, 0x0, 0x1ab60000}, 0x14) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, 0x0) r3 = getpid() ioprio_set$pid(0x2, r3, 0x6) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r4 = open(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000001c0)={0x3cf8, 0x7, 0x0, 0x9, 0xfffffffffffffbff}, 0x14) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:55:26 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) dup2(r0, r1) 00:55:26 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @remote, [], {@arp={0x6558, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random='b?VT\b\x00', @empty, @local, @remote}}}}, 0x0) 00:55:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r1}], 0x1, 0xfffffffffffffff8) 00:55:26 executing program 0: r0 = socket(0x1e, 0x2000000000000805, 0x0) setsockopt(r0, 0x0, 0x7, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x802, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000280), 0x80000) syz_open_dev$sg(0x0, 0x0, 0x81) r2 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000100)='Y \x00', 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r2, 0x1004000000016) close(r1) 00:55:26 executing program 1: setgroups(0x2, &(0x7f0000000a80)=[0x0, 0x0]) getgroups(0x40000173, &(0x7f0000000dc0)=[0x0]) [ 1143.538744][ T2167] input: syz1 as /devices/virtual/input/input39 00:55:26 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000200)={0x0, 0x1f, 0x0, 0x0}) 00:55:26 executing program 1: setgroups(0x2, &(0x7f0000000a80)=[0x0, 0x0]) getgroups(0x40000173, &(0x7f0000000dc0)=[0x0]) [ 1143.725937][ T2170] input: syz1 as /devices/virtual/input/input40 00:55:26 executing program 0: r0 = socket(0x1e, 0x2000000000000805, 0x0) setsockopt(r0, 0x0, 0x7, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x802, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000280), 0x80000) syz_open_dev$sg(0x0, 0x0, 0x81) r2 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000100)='Y \x00', 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r2, 0x1004000000016) close(r1) 00:55:27 executing program 1: setgroups(0x2, &(0x7f0000000a80)=[0x0, 0x0]) getgroups(0x40000173, &(0x7f0000000dc0)=[0x0]) 00:55:27 executing program 5: r0 = socket(0x1e, 0x2000000000000805, 0x0) setsockopt(r0, 0x0, 0x7, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x802, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000280), 0x80000) syz_open_dev$sg(0x0, 0x0, 0x81) r2 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000100)='Y \x00', 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r2, 0x1004000000016) close(r1) 00:55:27 executing program 1: setgroups(0x2, &(0x7f0000000a80)=[0x0, 0x0]) getgroups(0x40000173, &(0x7f0000000dc0)=[0x0]) [ 1143.943511][ T2188] md: invalid raid superblock magic on mtdblock0 [ 1144.027001][ T2188] md: mtdblock0 does not have a valid v0.0 superblock, not importing! [ 1144.081258][ T2188] md: md_import_device returned -22 00:55:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x7, 0x0, 0x7e}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x7, 0x1, 0x0, 0x1ab60000}, 0x14) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, 0x0) r3 = getpid() ioprio_set$pid(0x2, r3, 0x6) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r4 = open(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000001c0)={0x3cf8, 0x7, 0x0, 0x9, 0xfffffffffffffbff}, 0x14) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:55:27 executing program 0: r0 = socket(0x1e, 0x2000000000000805, 0x0) setsockopt(r0, 0x0, 0x7, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x802, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000280), 0x80000) syz_open_dev$sg(0x0, 0x0, 0x81) r2 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000100)='Y \x00', 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r2, 0x1004000000016) close(r1) 00:55:27 executing program 1: r0 = socket(0x1e, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000008000)={0x0, 0x0, &(0x7f0000241ff0)=[{&(0x7f00009a9fff)=""/1, 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000003180)=[{{&(0x7f0000001780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1, &(0x7f0000002c40)=""/7, 0x7}}], 0x1, 0x0, 0x0) 00:55:27 executing program 5: r0 = socket(0x1e, 0x2000000000000805, 0x0) setsockopt(r0, 0x0, 0x7, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x802, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000280), 0x80000) syz_open_dev$sg(0x0, 0x0, 0x81) r2 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000100)='Y \x00', 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r2, 0x1004000000016) close(r1) 00:55:27 executing program 4: r0 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x21, &(0x7f0000745ffc), &(0x7f0000b96000)=0x35b) 00:55:27 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000504000)={0x0, 0x0, &(0x7f0000812ff0)={&(0x7f000047c000)=@newlink={0x34, 0x10, 0x9, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc}]}, 0x34}}, 0x0) 00:55:27 executing program 4: r0 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x21, &(0x7f0000745ffc), &(0x7f0000b96000)=0x35b) 00:55:27 executing program 1: r0 = socket(0x1e, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000008000)={0x0, 0x0, &(0x7f0000241ff0)=[{&(0x7f00009a9fff)=""/1, 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000003180)=[{{&(0x7f0000001780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1, &(0x7f0000002c40)=""/7, 0x7}}], 0x1, 0x0, 0x0) 00:55:27 executing program 0: r0 = socket(0x1e, 0x2000000000000805, 0x0) setsockopt(r0, 0x0, 0x7, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x802, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000280), 0x80000) syz_open_dev$sg(0x0, 0x0, 0x81) r2 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000100)='Y \x00', 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r2, 0x1004000000016) close(r1) 00:55:27 executing program 1: r0 = socket(0x1e, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000008000)={0x0, 0x0, &(0x7f0000241ff0)=[{&(0x7f00009a9fff)=""/1, 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000003180)=[{{&(0x7f0000001780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1, &(0x7f0000002c40)=""/7, 0x7}}], 0x1, 0x0, 0x0) 00:55:27 executing program 4: r0 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x21, &(0x7f0000745ffc), &(0x7f0000b96000)=0x35b) 00:55:27 executing program 1: r0 = socket(0x1e, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000008000)={0x0, 0x0, &(0x7f0000241ff0)=[{&(0x7f00009a9fff)=""/1, 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000003180)=[{{&(0x7f0000001780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1, &(0x7f0000002c40)=""/7, 0x7}}], 0x1, 0x0, 0x0) 00:55:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x7, 0x0, 0x7e}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000340)={0x7, 0x1, 0x0, 0x1ab60000}, 0x14) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, 0x0) r3 = getpid() ioprio_set$pid(0x2, r3, 0x6) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r4 = open(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000001c0)={0x3cf8, 0x7, 0x0, 0x9, 0xfffffffffffffbff}, 0x14) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:55:28 executing program 2: r0 = open(&(0x7f00000000c0)='./file1\x00', 0x4140, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x1) 00:55:28 executing program 5: r0 = socket(0x1e, 0x2000000000000805, 0x0) setsockopt(r0, 0x0, 0x7, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x802, 0x0) accept4$netrom(r0, 0x0, &(0x7f0000000280), 0x80000) syz_open_dev$sg(0x0, 0x0, 0x81) r2 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000100)='Y \x00', 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x3, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r2, 0x1004000000016) close(r1) 00:55:28 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0xfffffffffffffffe}}, 0x5c) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 00:55:28 executing program 4: r0 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x21, &(0x7f0000745ffc), &(0x7f0000b96000)=0x35b) 00:55:28 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:28 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0xfffffffffffffffe}}, 0x5c) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 00:55:28 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getpeername$netrom(r0, 0x0, 0x0) [ 1145.814862][ T2260] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1145.846412][ T2260] FAT-fs (loop1): Filesystem has been set read-only 00:55:29 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0xfffffffffffffffe}}, 0x5c) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) [ 1145.895080][ T2250] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 00:55:29 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getpeername$netrom(r0, 0x0, 0x0) [ 1145.946533][ T26] audit: type=1800 audit(3329.074:236): pid=2271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=16686 res=0 [ 1145.947486][ T2250] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 00:55:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x0, 0x0, @rand_addr="01b5ef85910252e6c4efa9bca4e63135"}, {0xa, 0x0, 0x0, @rand_addr="d9ae84d566afd5258cac14436b02c484"}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10006]}, 0x5c) sendmsg$key(r0, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x33}, 0x2a}, 0x2}, 0x0) 00:55:29 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0xfffffffffffffffe}}, 0x5c) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) [ 1146.053179][ T26] audit: type=1800 audit(3329.184:237): pid=2271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=16686 res=0 [ 1146.227307][ T2260] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 00:55:29 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:29 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getpeername$netrom(r0, 0x0, 0x0) 00:55:29 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) 00:55:29 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 00:55:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x0, 0x0, @rand_addr="01b5ef85910252e6c4efa9bca4e63135"}, {0xa, 0x0, 0x0, @rand_addr="d9ae84d566afd5258cac14436b02c484"}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10006]}, 0x5c) sendmsg$key(r0, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x33}, 0x2a}, 0x2}, 0x0) 00:55:29 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:30 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) 00:55:30 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getpeername$netrom(r0, 0x0, 0x0) [ 1146.858371][ T2303] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1146.934408][ T2291] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 00:55:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x0, 0x0, @rand_addr="01b5ef85910252e6c4efa9bca4e63135"}, {0xa, 0x0, 0x0, @rand_addr="d9ae84d566afd5258cac14436b02c484"}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10006]}, 0x5c) sendmsg$key(r0, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x33}, 0x2a}, 0x2}, 0x0) 00:55:30 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) [ 1146.981996][ T2303] FAT-fs (loop1): Filesystem has been set read-only [ 1147.018016][ T2291] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 00:55:30 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:30 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) 00:55:30 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x0, 0x0, @rand_addr="01b5ef85910252e6c4efa9bca4e63135"}, {0xa, 0x0, 0x0, @rand_addr="d9ae84d566afd5258cac14436b02c484"}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10006]}, 0x5c) sendmsg$key(r0, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x33}, 0x2a}, 0x2}, 0x0) 00:55:30 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 00:55:30 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x200000000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x6, @pix={0x0, 0x1, 0x37303250, 0x0, 0xffffffffffffffe0, 0x0, 0xb, 0x2, 0x1, 0x6, 0x1, 0x7}}) ioctl$TIOCNXCL(r0, 0x540d) eventfd(0x8) r2 = getpid() ptrace(0x4207, r2) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000480)="b60835f0ecd82e513d177c4e43c59f68c3873d64bd65bafac73164aead5cf593a0200cc77aeaaed6580e7daab05364ff617ed2b4dc6aa41f137339a68034d3fdbf02") getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(r3, 0xffffffffffffffc7, &(0x7f0000000140)) getrandom(&(0x7f00000006c0)=""/198, 0xfffffffffffffe15, 0x3) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x6, 0x12, r1, 0x0) get_robust_list(0x0, &(0x7f00000003c0)=&(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)}}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/41, &(0x7f0000000140)=0x29) ptrace(0x421d, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 00:55:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0acc17123c123f319bd070") semtimedop(0x0, &(0x7f0000000200), 0x9c, 0x0) [ 1147.728666][ T2343] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1147.768573][ T2331] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 1147.811227][ T2343] FAT-fs (loop1): Filesystem has been set read-only [ 1147.834154][ T2331] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 00:55:31 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:31 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 00:55:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffae, 0x0, 0x80ffff}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) 00:55:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0acc17123c123f319bd070") semtimedop(0x0, &(0x7f0000000200), 0x9c, 0x0) 00:55:31 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:31 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffae, 0x0, 0x80ffff}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) 00:55:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0acc17123c123f319bd070") semtimedop(0x0, &(0x7f0000000200), 0x9c, 0x0) [ 1148.192883][ T2365] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 0) 00:55:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffae, 0x0, 0x80ffff}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) [ 1148.251832][ T2370] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 1148.260486][ T2370] FAT-fs (loop3): Filesystem has been set read-only [ 1148.269870][ T2359] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) [ 1148.290063][ T2352] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) [ 1148.312969][ T2365] FAT-fs (loop1): Filesystem has been set read-only [ 1148.333781][ T2359] FAT-fs (loop1): error, invalid access to FAT (entry 0x00006500) 00:55:31 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0) 00:55:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffae, 0x0, 0x80ffff}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) [ 1148.375997][ T2352] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500) 00:55:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0acc17123c123f319bd070") semtimedop(0x0, &(0x7f0000000200), 0x9c, 0x0) 00:55:31 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:31 executing program 0: unshare(0x28020400) r0 = socket$kcm(0xa, 0x2, 0x73) sendmmsg(r0, 0x0, 0x0, 0x0) 00:55:31 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x44ff}) getsockopt$inet6_buf(r0, 0x29, 0x1f, &(0x7f00000000c0)=""/150, &(0x7f0000000000)=0x96) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000002900)='/dev/null\x00', 0x80000, 0x0) preadv(r1, &(0x7f0000002700)=[{&(0x7f0000000480)=""/148, 0x94}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000000380)=""/45, 0x2d}, {&(0x7f0000001540)=""/149, 0x95}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/204, 0xcc}], 0x6, 0x0) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) signalfd4(r2, &(0x7f0000000140)={0x6}, 0x8, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000280)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) poll(&(0x7f0000000240)=[{r3, 0x1}, {r4, 0x1000}, {r0, 0x400}, {r1, 0x1}], 0x4, 0x7fff) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r5, r6, 0x0, 0x8000fffffffe) 00:55:31 executing program 5: r0 = socket$inet(0x2, 0x2000000080003, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00P\xd0\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'veth0_to_bond\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) 00:55:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='coredump_filter\x00') read$eventfd(r0, 0x0, 0x0) 00:55:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlink(0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) fchdir(r0) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="00000077b9633aea304c8b49248a8b00000000000700080000ee8b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4d9a3841f9d66e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e62f84facf3fbe2b90847de6a88512301a50fb20767c9b8b69819d787ea7c347d56028313c3905f4d1eb3bbc205397585b9d9494289512dca45d6b5283db159655e19bbabc3ad722139d8d1a2938d0d39bcf9c13b72544d06cf11bb"], 0xd9) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x4000000000000) inotify_rm_watch(r0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 00:55:32 executing program 5: r0 = socket$inet(0x2, 0x2000000080003, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00P\xd0\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'veth0_to_bond\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) 00:55:32 executing program 0: unshare(0x28020400) r0 = socket$kcm(0xa, 0x2, 0x73) sendmmsg(r0, 0x0, 0x0, 0x0) 00:55:32 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000200)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x2000000098f900, 0x0, [], @value64}}) 00:55:32 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000200)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x2000000098f900, 0x0, [], @value64}}) 00:55:32 executing program 5: r0 = socket$inet(0x2, 0x2000000080003, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00P\xd0\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'veth0_to_bond\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) 00:55:32 executing program 0: unshare(0x28020400) r0 = socket$kcm(0xa, 0x2, 0x73) sendmmsg(r0, 0x0, 0x0, 0x0) 00:55:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='coredump_filter\x00') read$eventfd(r0, 0x0, 0x0) 00:55:32 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000200)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x2000000098f900, 0x0, [], @value64}}) 00:55:32 executing program 5: r0 = socket$inet(0x2, 0x2000000080003, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00P\xd0\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'veth0_to_bond\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) 00:55:32 executing program 0: unshare(0x28020400) r0 = socket$kcm(0xa, 0x2, 0x73) sendmmsg(r0, 0x0, 0x0, 0x0) 00:55:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x20, r1, 0x221, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x02'}]}]}, 0x20}}, 0x0) 00:55:33 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x84, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x200, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) 00:55:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:55:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='coredump_filter\x00') read$eventfd(r0, 0x0, 0x0) 00:55:33 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000200)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x2000000098f900, 0x0, [], @value64}}) 00:55:33 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[@ANYBLOB="07000000000000000060000000000000b50000000000000016335a557fded281ab5d1c7261831d35e7f9b2dd085d555853feb57dcd7930a75be67f2e4933be3d7c8f6c5504943a3ea1c078bc17a8458c079c62935b46dc6cfe541870c9fae52ad3fa25515243d6f3c18dba560eefe8b61679993305c8a7397a069bcf1f07db2e46cf1c2445bd55168a4f4328acb0095a0e7ef0ae4f9856a01cb49bf07589f99f5aa7351e1d540208e90032bde1403b14616bb14e9a49f32000000000000000000000000000adeb4d15bea5e541720d691d"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000340)) 00:55:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000240)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x4, 0x4, 0x100000001}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) close(r3) 00:55:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x20, r1, 0x221, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x02'}]}]}, 0x20}}, 0x0) 00:55:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:55:33 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[@ANYBLOB="07000000000000000060000000000000b50000000000000016335a557fded281ab5d1c7261831d35e7f9b2dd085d555853feb57dcd7930a75be67f2e4933be3d7c8f6c5504943a3ea1c078bc17a8458c079c62935b46dc6cfe541870c9fae52ad3fa25515243d6f3c18dba560eefe8b61679993305c8a7397a069bcf1f07db2e46cf1c2445bd55168a4f4328acb0095a0e7ef0ae4f9856a01cb49bf07589f99f5aa7351e1d540208e90032bde1403b14616bb14e9a49f32000000000000000000000000000adeb4d15bea5e541720d691d"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000340)) 00:55:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x20, r1, 0x221, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x02'}]}]}, 0x20}}, 0x0) 00:55:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000240)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x4, 0x4, 0x100000001}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) close(r3) 00:55:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:55:34 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x84, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x200, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) 00:55:34 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[@ANYBLOB="07000000000000000060000000000000b50000000000000016335a557fded281ab5d1c7261831d35e7f9b2dd085d555853feb57dcd7930a75be67f2e4933be3d7c8f6c5504943a3ea1c078bc17a8458c079c62935b46dc6cfe541870c9fae52ad3fa25515243d6f3c18dba560eefe8b61679993305c8a7397a069bcf1f07db2e46cf1c2445bd55168a4f4328acb0095a0e7ef0ae4f9856a01cb49bf07589f99f5aa7351e1d540208e90032bde1403b14616bb14e9a49f32000000000000000000000000000adeb4d15bea5e541720d691d"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000340)) 00:55:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000240)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x4, 0x4, 0x100000001}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) close(r3) 00:55:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 00:55:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x20, r1, 0x221, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x02'}]}]}, 0x20}}, 0x0) 00:55:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='coredump_filter\x00') read$eventfd(r0, 0x0, 0x0) 00:55:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000240)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x4, 0x4, 0x100000001}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) close(r3) 00:55:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000240)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x4, 0x4, 0x100000001}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) close(r3) 00:55:34 executing program 2: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f00000000c0), 0xb, 0x0, 0x0, &(0x7f0000000080), 0x0) 00:55:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x26, 0x76}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 00:55:34 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[@ANYBLOB="07000000000000000060000000000000b50000000000000016335a557fded281ab5d1c7261831d35e7f9b2dd085d555853feb57dcd7930a75be67f2e4933be3d7c8f6c5504943a3ea1c078bc17a8458c079c62935b46dc6cfe541870c9fae52ad3fa25515243d6f3c18dba560eefe8b61679993305c8a7397a069bcf1f07db2e46cf1c2445bd55168a4f4328acb0095a0e7ef0ae4f9856a01cb49bf07589f99f5aa7351e1d540208e90032bde1403b14616bb14e9a49f32000000000000000000000000000adeb4d15bea5e541720d691d"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000340)) 00:55:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000240)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x4, 0x4, 0x100000001}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) close(r3) 00:55:35 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x84, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x200, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) 00:55:35 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x183802, 0x0) pwritev(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)='X', 0x1}], 0x1, 0x0) 00:55:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x26, 0x76}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 00:55:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:35 executing program 2: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f00000000c0), 0xb, 0x0, 0x0, &(0x7f0000000080), 0x0) 00:55:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000240)="0adc1f123c123f319bd070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x4, 0x4, 0x100000001}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) close(r3) 00:55:35 executing program 2: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f00000000c0), 0xb, 0x0, 0x0, &(0x7f0000000080), 0x0) 00:55:35 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x183802, 0x0) pwritev(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)='X', 0x1}], 0x1, 0x0) 00:55:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x26, 0x76}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 00:55:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 00:55:35 executing program 2: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f00000000c0), 0xb, 0x0, 0x0, &(0x7f0000000080), 0x0) 00:55:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:36 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x84, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x200, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) 00:55:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 00:55:36 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x183802, 0x0) pwritev(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)='X', 0x1}], 0x1, 0x0) 00:55:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 00:55:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x26, 0x76}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 00:55:36 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x183802, 0x0) pwritev(r0, &(0x7f00000012c0)=[{&(0x7f0000000100)='X', 0x1}], 0x1, 0x0) 00:55:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 00:55:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 00:55:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 00:55:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 00:55:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000beeff0)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}, {@in6=@mcast2, 0x0, 0x32}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}}}]}, 0x2ec}}, 0x0) 00:55:37 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)="f346ab443c00c4837916448d3300c4e2290965edc4831546b1fbffffff0c64470fe1bb8b3e0000f3456d672e66450f38290b420f0122440f495f8c", {}, 0x0, &(0x7f00000003c0)="c443297b4b00e5660f7ccec441782ef6f30fbd4fe82666470f38db1ac402159a55638f886097bb0c0000000ac4c3653811ff2e26f2450f585b71d12489"}, 0x8, &(0x7f0000000440)) 00:55:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x220, 0x0, 0x0, 0x10000007a) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000340)={0x4000000007b, 0x0, [0x20000048a]}) 00:55:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:37 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000380)) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000000280)=""/131, 0x38) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) 00:55:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) writev(r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, 0x0) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 00:55:37 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8002, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) write$UHID_INPUT(r0, &(0x7f0000000040)={0x8, "90cf785e8dbb677630f919f1e333cc1aac11a8a5cb1f4e20679d46fbf90f023d8574791238f18215f51d1dbbcbb0630879c9cca041cf8c03ad69ecbc5c920a26c3cef60d1b63403928585910b9bc7d4fd45703c212c495c7881f03e7a08636cd65c4c2948857a5e55a2ea6ad42908d9cb81721bb40055ecc52e5ee73e4f78a393729187d21c417145357ee5d7b4a963b617c74a8223d39c1413e6b495029aa0cc4373d583e9e5291a29068b9138c855738f7fbd8b439e6adc1ffbbfc7586533fd3e6d7d99816bfe75c83627fe0bac1893b281a1d8ecf5f3fa5152d968c8fa256940afe0c8458c2cb270fc883d3024d5427f3a49e11f8ee8f85624fff1c59526d7001c241749040ce86ba8f2a93f3393d8d2f0055e8f1e1ec182759d80064b579659c6d29c1bcc6155aaa2191b9928df2a6785ca5750533f28e1c818330083d82ce098a7f04f6e5cc8d77c231946bfbadbd42a23aa51e09d735d89212893f4982cb797081f795ea3a3c33f5bb05529ae681a60d74f643ddc121d912846fcbe1c727406e802aa7c4f2426f4d17957fc23220dd27d9e529b72bd714ee00b1cf3e045efb587d02752e1be8f7c6130570b692b75eb32d9c3cf9612889f534c3ccf3fb67c8c8676c357ff4a7db778a4383ac55b984bf2a13d79e997bdcd1c5c5e4941e66b2ae2a500ee57d7c9aa372338e2ea43b1069cd76cacd52440b8b92fb091564771eccff8b5cd36b844fb92ca891e822702ba71792d68201887f6f4e2a328d0918d16c64f6efe73432bc48076f81d5e7d80e11b019db08cdb42a593a4e681a7916e55d62a728ff820814f2149634f630913e8bad288b6691632310e4bae43b8c7c36a12ff60c9539d04fca76465659f594741e3ca146b551d7832eeecb078f205bfbb845657858d3df3f95de35d2d35a90f4e1b050b7ab725c2e2ba9aa9fa6860017ea433c2562e0833124a7bc2f1e135c62be6b41973cb73aebde66993c3d1b567af33b8442215490cf3637c55069ab128983086dca01d1d9964f5c82cebde47fd102e1ee2aecf1f0693a4d0f5c1ff59ada5bd06789d027bbe7e3f49cdd9af3db7968a76bc95b70e2adc49e1e80614d5b72f780397209956a3f4b2eb3fcd0bc084705402d51bddf85eaff4f08ebbbc83132eefa33562f8c496053d49711d76af2d61a9608dca72fdc7cad2c3d9cbc426cba836f5b96b784e558130e6ee9a166315380ff3e6859ec4cf24ea3d7f321c9bb7d8b8921d8f9ae612927cadbfbcfbf92029edff9685b10fbf915e78058fa3698b7a02d4b996ae6ef61c2c6e77254a2631b73e5a6368339e91e60c014a54d64c9a252906145fd98b91643aee605b2e98ccde4b6002bd279ea30a7e3b93423bfc263eee97f6204432da353a603a71891ec8109aeb032bd434026aee5dc4500ddc2a6abe70aa656c305df6aeb1c4d617ef1f3585d4696a5b81e82fbe964526f52528ea605e3652a84f9d7e1876b127cc81624da63b6b866b171e1ca8fb160528941c8711817cbeb39bb56b0c5339d0a227be05d3f0918d3ab27edd38663c6b5137a5ca49061d62eeb3a680fa8365200346038b90ecb2e013bd49e84bc9f560c1292d96a12d5c16ae26bbb4178d664fc3a9a27e18279090c2c6aa931964cb1e2a7cda3b2b7bb0135103a553463509bd2101bf51a48564b1b73fae17558fadda2e5e0efc99b700cc7e75df9021aa45032ca9a6ad2489cf77fcee7838c890440fb465dab0986fcb67daafd191f72ea49547eba7aa95461d735e382c2828978d702a885cd315a655ca419716cd0588582cb01f4ade9e70d6d86d9f52a87271b3a61bee1af5e9af4834ddfa4fce99425a26ec6cc45ca2b4705b9bb53300fa7d8d5be8f51992c482db78a4048c13e4d5e6e44d15b43a9604303bcdba2f5a3c0215393a4fdd6b0c4c8da408f930ae26f64feb9918ce3030f59bd461199ff072d2997a05ca757b9f380d5c46b7b1fcd38b8701315599719976493a0efcc6b0a4a64912d2e6d892214d8a896568cbd7ec8a8231bd57ee73aba946231128de78172ff0ddd3eca9e6575df0dcf00cc0ef0e4429c43d43961ee0804c9f913daab9dda0dc619ed4726f4f32095a5e0f70e4e6884d4ff8e48fb8b03ee58c679a41201a0cbe47fec365ba8f4eeccbe2544448969fbcd7965c4f9b2d790e8958d38d12ce4fed2e794a3463d4b2d0a0540f039d86e2dcd24ed8bc5655fc5c7fc38104be0a2c948613029bb2f498e4b48e65ea7d6124ef166aa105b47dd7bebfbcb67f6a61a925f4c0777062bb40799c7c2bb0ce1c00e83d184975533f75b6d925e118ef347c2d4500c2032e8e774844140e97b87733fa560b68081ba6fabe786354d46af7e980afa54decbaf31634fcc5c457d303de76eb4a80ecac82c2dab54bd445f43e18f5e36963123779b91c24e6c7a9c90b8c400413d7784ad30a4e049a39f50ca8f3a4eaed5ada374c4c96fab65ce1b23733e0900b41528a86dfd2dc1108a29a49a19677ccd32fbb34605236900ced876523b9df59ae250a4fe3f0a3fb906ba9d83479eb35a558e9522e457cff2873becd135309c81fe768fda43add8ecc37dc2ddae28148298954b61154371fa522fbecaeb1dc71babd20f9021c42fcaa9e1314fe9509aec7841b5ad3920056d37374e2b9d5e6041b461ee38228d73bdec4233fcfa6f41b233f6ef287aa84d375bfa2319e9319a1d52eb5d30ec2e409571f8226048fe35b250adcae8273628cff68b930eeddddc5598882bf3351f2b6f51e93d52917a13b17ebf8f91066d3be8c826cfa8df48efc37a3532d158d8d4e86b82cab950655ce89531772e06684cc4c36c8983004e64076dc73bd8586a5e78d0d96588056c376d3d383d811693834ecd08f24cbe353dfbb46cb547a93635f6e8504a755f19dcbf3947c5830c0f0b0bc7f69edf1f8a72ecbc44969aecde6ba99d2515f9974f1ee4a8f26aaf70e88ed0fb11e547b1aeb75c7d23983abadcbd150c53cf8aaf6a0afd7653c7fd5cdfe9740e324a2d1d63b65ee52a194695cfae3e3f641c4cfd84f20388f2ac1c4228ce63f6c5b060ca1e5dcd789855b5ef77e15e833b9dec614a61c3d88134ec7c34149e3c480b7051afa8450e988a45d423018fc59da6266d3ae4545cc33c328cfde1e67c33a94cd562feab07b2b6eaff99cc4c77bc6d917c30550ff5631da7569a18bd63f3f60a5fb11cdd6a4fa123168c9e9a0a73eb218dfaa242d31cf99e2725c6a3f600174df7b915463706656a2c6b51c7ad11ea81abf5cc6f1e2c07470af8a3b09378090f76a1575444e778696455b3aa5c9286d92ece6020903008600998433ac5c19854039703330c516067dc31f818f99facffaf2e7be957316a9d5d23dd8bee82a50b27a405ec4d1b5106079c98ef2eabb692cbd1bd0bec7a4dfe9e65c135792b35517d9a05f17a17ccefc91a1491e0b9a25f89dea0f562c4fa6bf96171338d4106890a29660c96e81255b0abffbe806d98f4c0eb9b2087c445c466d99039c714c84384cd7b99b54afb5fc000bace28b030a4bb171532a1f7da31924cd027479ad557c2164da7fa539309d5962f8ab585533e0894636c8a3438c8593e5b95259e81d9fe6a503acafe0f2fbe5394178d3452a8c70a6a9305c6976bd7675319ee7cb9c9ca9ab846a551fd601fdee00e335d325975d389ec85bc167ed2b11a7616e515862792d6cee8cb0961ca671013132a4a9ec03b05406c49d276fb6080c621ebec6a34ed2930560d7914d4931ac5dc39f8052404643f34139e5e1612a75fe6cd8bd61c3ebd794f831439dc0a0e5f5a8e25cda09b7faee3e4c63cd858eb10a3c600540d413b1e19fbfeb448b6767e865dcbb6f41426dc605de66f35991f0df1cb9bb5587649804ba00ada941417cf9ee361c6c776d1038b62673d878e64b093d911fac318e48ecaf7acc9a874ab5463e58737a124da26292f3f0f3eea356cd2c0f6a4edb0da7104157a0cec5bce2132ccc4ee13e3beacfe07319c2c9f39114b3780280bc6b67246bcb09605a3b4cad65c0e35f91faaaea9c2f853fa389b44012967910a91b0f43c26df2c0b704b25ea0107a381cad4a9eae2693186900b07142a774157d5813c46d1b4ffe14c282dd70b6c975f005c475c5d55830c7744ad3de5486fa67b59a927ad7d02b3c9bd04f16da7b9a47d5f4eaa58e31dd22044d321f3e22865a3cf8cff444ca26ed170e4af4fc5b082892a935084995bd8254265012c68f35af90173f7b264ee0bcd894eb9a75d6686168236fb989fa840554a91fad335de61cc674b1a575230589c20456935389bd9640e4752c562a52a1aa73895696e92610731710e3b85efbb3da8b5da6ab5b68f89d161364adae0e67c949535fa0f49bb8f7c73f6f966f19de76d62c27bdb3c3f21f8576920ed43e3d6cbfc65acb3d04c47c7a5013dcccee929c250c954686f266efe3b2874ef396b670571c36bda050dd1059fa7fa1127841ba8983b67d33f4cc2698703de3d8b67356616aa91d53732174701985abe7462ed86770b703fbe422f68df653d2b4fb3cd40d3e907f4cf4c7a4c4819b3b9ad85e33458fe6b91a2646ae43bd6d1ba4703ee9891d09cbaf99dacb980a1c9986deff2eb1e9ef9318df8bf39358796107a01b32d6f1c457d7aa5448fd1ba0fd27cb24eb5a51f1fa1d579e07a4b30e1932a8943acc40b6a8a46dc15832842507aaa5ca1982d96611f62a687e491cef4abba89db4b998075200d2dd9091d0240256ef4fe4b327997c1d6bf8c9307d55d37ee800197003bd3769f5424afc34e16ea95b78e2a2ee2ede455f4266df0d5414d0bb81e959511bff9562000e00350a380db943988383d885aeee9cb7d03a6d8973dc7bd2cf3d0bb90de050234af43b474422f1b003c72b8c7cf56ddc5f0c491adb8acfd3188a172014a4ff323a406456a37c0fff22ad5f0aa75992123362a83e4403e90ea498376ade978e6a72b0d8ad09c942b1c6f9d3d3419fafaf415def64da5e4339f2904e769d809516860e20499c443beb71fdcc3ff21f80492392a9d2da49cf722d69802480679496c7a907c8402fcf9285c14d01b0cd007a8d3acdbac52d09e06995afe557a5ca7fbdc4333e2b688122a0541dddba623b00f04b6a1e965c33e8f4606ae7522a327d8ae5f288e8f8aa0460136746f4f03636b0188b1bb14b05ec7c098507f455c26977b2c5b31084961d47000c67688dff261164d2a83675829cfbe334cd1157e663f74fd0dca34243520ee6eabf8cffffd5a9ecf31f85819fb1865e9268913161e82c72d905f97e26f4efbdc09e227b94d2e4c19f57ed59ec670b696b0f6b7469fc0ca313bab685be62925b056b5f9ace16dab094a1637d2fa42c6017274673141fc8d6f9c6aaf926babab9944a5ab077231ce9e0e544d918392a026d0924b9c444cacede44bb288d04f21412aa5ac715e84424b4ac487f0948bf8f8cecab9b98987499d44499b44bbbda5938c8c4d3a96dd827354ade469b582464abe5781ebb382c914891d9cb479e3ae66a884ef021e73088ff35217d33665516cc0bb4b65868bad51025c18b6488c5d21b8b325cc41b76670d716bae495fb54e520d4a461e80f645672987865a45c4856f42291a2116d14d134fb4a36bc365cc2e54b4cf3aec0a8b4b9c7afe64329fa53cd7b7e39830f58087a9b18b678055fbad55f032899507ff09ad1130f27fead3ef09ee082c4a367a3c978732688d9f9e14035bbfce091b15f7e8d4553d237b47fc842cb44f732c01e1d5517acc4f34c1e9a8ff49e2b1637", 0x1000}, 0x1006) 00:55:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) r4 = eventfd(0x40000000003) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4, 0x4, 0x2, r4}) sendmmsg(r0, 0x0, 0x0, 0xaa05) 00:55:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) r4 = eventfd(0x40000000003) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4, 0x4, 0x2, r4}) sendmmsg(r0, 0x0, 0x0, 0xaa05) 00:55:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) r4 = eventfd(0x40000000003) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4, 0x4, 0x2, r4}) sendmmsg(r0, 0x0, 0x0, 0xaa05) 00:55:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18}, 0x18) [ 1154.690895][ T2650] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1154.733849][ T2641] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 00:55:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2002) ppoll(&(0x7f0000000000)=[{r1}], 0x2a, 0x0, 0x0, 0x0) [ 1154.776307][ T2654] sctp: [Deprecated]: syz-executor.3 (pid 2654) Use of int in max_burst socket option deprecated. [ 1154.776307][ T2654] Use struct sctp_assoc_value instead 00:55:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) r4 = eventfd(0x40000000003) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4, 0x4, 0x2, r4}) sendmmsg(r0, 0x0, 0x0, 0xaa05) 00:55:38 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000380)) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000000280)=""/131, 0x38) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) 00:55:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2002) ppoll(&(0x7f0000000000)=[{r1}], 0x2a, 0x0, 0x0, 0x0) 00:55:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) r4 = eventfd(0x40000000003) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4, 0x4, 0x2, r4}) sendmmsg(r0, 0x0, 0x0, 0xaa05) 00:55:38 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18}, 0x18) 00:55:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2002) ppoll(&(0x7f0000000000)=[{r1}], 0x2a, 0x0, 0x0, 0x0) [ 1155.198698][ T2686] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1155.219115][ T2685] sctp: [Deprecated]: syz-executor.3 (pid 2685) Use of int in max_burst socket option deprecated. [ 1155.219115][ T2685] Use struct sctp_assoc_value instead 00:55:39 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8002, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) write$UHID_INPUT(r0, &(0x7f0000000040)={0x8, "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", 0x1000}, 0x1006) 00:55:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18}, 0x18) 00:55:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) r4 = eventfd(0x40000000003) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4, 0x4, 0x2, r4}) sendmmsg(r0, 0x0, 0x0, 0xaa05) 00:55:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet(0x2b, 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x2002) ppoll(&(0x7f0000000000)=[{r1}], 0x2a, 0x0, 0x0, 0x0) 00:55:39 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000380)) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000000280)=""/131, 0x38) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) 00:55:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18}, 0x18) [ 1156.652683][ T2697] sctp: [Deprecated]: syz-executor.4 (pid 2697) Use of int in max_burst socket option deprecated. [ 1156.652683][ T2697] Use struct sctp_assoc_value instead 00:55:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1) ioctl$VT_ACTIVATE(r0, 0x5437, 0x0) [ 1156.703600][ T2703] sctp: [Deprecated]: syz-executor.3 (pid 2703) Use of int in max_burst socket option deprecated. [ 1156.703600][ T2703] Use struct sctp_assoc_value instead 00:55:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18}, 0x18) 00:55:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18}, 0x18) [ 1156.996551][ T2727] sctp: [Deprecated]: syz-executor.4 (pid 2727) Use of int in max_burst socket option deprecated. [ 1156.996551][ T2727] Use struct sctp_assoc_value instead [ 1157.038364][ T2730] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 00:55:40 executing program 4: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), 0x4) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18}, 0x18) 00:55:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1) ioctl$VT_ACTIVATE(r0, 0x5437, 0x0) [ 1157.288735][ T2743] sctp: [Deprecated]: syz-executor.3 (pid 2743) Use of int in max_burst socket option deprecated. [ 1157.288735][ T2743] Use struct sctp_assoc_value instead [ 1157.350324][ T2745] sctp: [Deprecated]: syz-executor.4 (pid 2745) Use of int in max_burst socket option deprecated. [ 1157.350324][ T2745] Use struct sctp_assoc_value instead 00:55:40 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000380)) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) read(r1, &(0x7f0000000280)=""/131, 0x38) write(r0, &(0x7f0000000080)="2400000012005f3414f9f40700090400818a0400"/36, 0x24) 00:55:40 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8002, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) write$UHID_INPUT(r0, &(0x7f0000000040)={0x8, "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", 0x1000}, 0x1006) 00:55:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1) ioctl$VT_ACTIVATE(r0, 0x5437, 0x0) 00:55:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0add1f033c273f319bd070") perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 00:55:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)) eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) r4 = eventfd(0x40000000003) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r4, 0x4, 0x2, r4}) sendmmsg(r0, 0x0, 0x0, 0xaa05) 00:55:40 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x3, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 00:55:41 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x3, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) [ 1158.186390][ T2776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 00:55:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0add1f033c273f319bd070") perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 00:55:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1) ioctl$VT_ACTIVATE(r0, 0x5437, 0x0) 00:55:41 executing program 5: rename(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)='./file0\x00') 00:55:41 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x3, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 00:55:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0add1f033c273f319bd070") perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 00:55:42 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) 00:55:42 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8002, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) write$UHID_INPUT(r0, &(0x7f0000000040)={0x8, "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", 0x1000}, 0x1006) 00:55:42 executing program 5: rename(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)='./file0\x00') 00:55:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0add1f033c273f319bd070") perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) [ 1159.270438][T15195] block nbd0: Receive control failed (result -22) [ 1159.392824][ T2822] block nbd0: shutting down sockets 00:55:42 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x3, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) 00:55:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000000)) [ 1159.598286][ T2822] block nbd0: shutting down sockets 00:55:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) dup2(r1, r2) 00:55:42 executing program 5: rename(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)='./file0\x00') 00:55:42 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) 00:55:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) [ 1159.944084][T15195] block nbd0: Receive control failed (result -22) 00:55:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) dup2(r1, r2) 00:55:43 executing program 5: rename(&(0x7f0000000000)='.\x00', &(0x7f00000001c0)='./file0\x00') [ 1160.027438][ T2847] block nbd0: shutting down sockets 00:55:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) dup2(r1, r2) 00:55:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) 00:55:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) 00:55:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) [ 1160.388600][T15195] block nbd0: Receive control failed (result -22) 00:55:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) dup2(r1, r2) 00:55:43 executing program 5: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) [ 1160.439100][ T2868] block nbd0: Device being setup by another task 00:55:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) 00:55:43 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) [ 1160.652041][ T2867] block nbd0: shutting down sockets 00:55:43 executing program 4: socket(0x0, 0x0, 0x0) bind$ax25(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0xffffffffffffffea, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0x2d9, 0x3]}) [ 1160.773026][T15195] block nbd0: Receive control failed (result -22) [ 1160.809492][ T2886] block nbd0: Device being setup by another task 00:55:44 executing program 5: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) [ 1160.836640][ T2891] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 1160.855786][ T2884] block nbd0: Device being setup by another task 00:55:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) [ 1160.958949][ T2896] sit: non-ECT from 0.0.0.0 with TOS=0x3 00:55:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b80)={0x0, 0xda01, &(0x7f0000000000)={&(0x7f0000000140)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x33}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'rmd160\x00'}}}]}, 0x138}}, 0x0) 00:55:44 executing program 4: socket(0x0, 0x0, 0x0) bind$ax25(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0xffffffffffffffea, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0x2d9, 0x3]}) [ 1161.093488][ T2900] block nbd0: Device being setup by another task 00:55:44 executing program 5: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) 00:55:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b80)={0x0, 0xda01, &(0x7f0000000000)={&(0x7f0000000140)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x33}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'rmd160\x00'}}}]}, 0x138}}, 0x0) [ 1161.212943][ T2910] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 1161.325475][ T2877] block nbd0: shutting down sockets 00:55:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) 00:55:44 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) 00:55:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) 00:55:44 executing program 4: socket(0x0, 0x0, 0x0) bind$ax25(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0xffffffffffffffea, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0x2d9, 0x3]}) 00:55:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b80)={0x0, 0xda01, &(0x7f0000000000)={&(0x7f0000000140)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x33}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'rmd160\x00'}}}]}, 0x138}}, 0x0) 00:55:44 executing program 5: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) 00:55:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002b80)={0x0, 0xda01, &(0x7f0000000000)={&(0x7f0000000140)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x33}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'rmd160\x00'}}}]}, 0x138}}, 0x0) [ 1161.610517][ T2930] sit: non-ECT from 0.0.0.0 with TOS=0x3 [ 1161.625059][T15195] block nbd0: Receive control failed (result -22) [ 1161.656137][ T2929] block nbd0: Device being setup by another task 00:55:44 executing program 4: socket(0x0, 0x0, 0x0) bind$ax25(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0xffffffffffffffea, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0x2d9, 0x3]}) 00:55:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:55:44 executing program 1: write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x122) fstat(0xffffffffffffffff, &(0x7f0000000340)) [ 1161.826428][ T2940] sit: non-ECT from 0.0.0.0 with TOS=0x3 00:55:45 executing program 5: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_triestat\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) 00:55:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1161.903315][ T2946] sg_write: data in/out 262577/248 bytes for SCSI command 0x0-- guessing data in; [ 1161.903315][ T2946] program syz-executor.1 not setting count and/or reply_len properly [ 1161.988105][ T2938] block nbd0: Device being setup by another task [ 1162.352745][ T2934] block nbd0: shutting down sockets [ 1162.433322][ T2944] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1162.465063][ T2944] CPU: 1 PID: 2944 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1162.473007][ T2944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1162.483088][ T2944] Call Trace: [ 1162.486492][ T2944] dump_stack+0x172/0x1f0 [ 1162.490881][ T2944] dump_header+0x10f/0xb6c [ 1162.495354][ T2944] ? ___ratelimit+0x2c8/0x595 [ 1162.500068][ T2944] ? ___ratelimit+0x60/0x595 [ 1162.504720][ T2944] ? do_raw_spin_unlock+0x57/0x270 [ 1162.509846][ T2944] oom_kill_process.cold+0x10/0x15 [ 1162.514964][ T2944] out_of_memory+0x79a/0x1280 [ 1162.519706][ T2944] ? retint_kernel+0x2d/0x2d [ 1162.524314][ T2944] ? oom_killer_disable+0x280/0x280 [ 1162.529571][ T2944] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1162.535125][ T2944] ? memcg_event_wake+0x230/0x230 [ 1162.540164][ T2944] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1162.546052][ T2944] ? cgroup_file_notify+0x140/0x1b0 [ 1162.551267][ T2944] memory_max_write+0x169/0x300 [ 1162.556135][ T2944] ? mem_cgroup_write+0x360/0x360 [ 1162.561254][ T2944] ? mem_cgroup_write+0x360/0x360 [ 1162.566293][ T2944] cgroup_file_write+0x245/0x7a0 [ 1162.571240][ T2944] ? mem_cgroup_write+0x360/0x360 [ 1162.576268][ T2944] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1162.581916][ T2944] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1162.587630][ T2944] kernfs_fop_write+0x2ba/0x480 [ 1162.592555][ T2944] __vfs_write+0x8d/0x110 [ 1162.596894][ T2944] ? kernfs_fop_open+0xd90/0xd90 [ 1162.601843][ T2944] vfs_write+0x20c/0x580 [ 1162.606100][ T2944] ksys_write+0x14f/0x2d0 [ 1162.610444][ T2944] ? __ia32_sys_read+0xb0/0xb0 [ 1162.615227][ T2944] __x64_sys_write+0x73/0xb0 [ 1162.619859][ T2944] ? do_syscall_64+0x5b/0x610 [ 1162.624553][ T2944] do_syscall_64+0x103/0x610 [ 1162.629155][ T2944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1162.635052][ T2944] RIP: 0033:0x458da9 [ 1162.638952][ T2944] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1162.658569][ T2944] RSP: 002b:00007f9315ee1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1162.666998][ T2944] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 1162.674977][ T2944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1162.682965][ T2944] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1162.690941][ T2944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9315ee26d4 [ 1162.698922][ T2944] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff 00:55:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x18040) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(0x0, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000400)='./file0//ile0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00022abd7000fcdbdf25100000005c000300080003000000000008000400000000001400020074756e6c30000000000000000000000008000500e000000208000100020000000800030002000000080007004e22000014000600ff0100000000000000000000000000010800040044000000080006000100000008000400030000000800050000000000080005000500000018000300140002007465616d300000000000000000000000080004000100010040000200140001007f00000100000000000000000000000008000700040000000800"], 0x1}}, 0x80) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) rmdir(0x0) close(r4) writev(r0, &(0x7f00000002c0), 0x0) 00:55:45 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000000)={0x1, 0x2, @start}) 00:55:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:55:45 executing program 1: write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x122) fstat(0xffffffffffffffff, &(0x7f0000000340)) 00:55:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1162.802379][ T2962] sg_write: data in/out 262577/248 bytes for SCSI command 0x0-- guessing data in; [ 1162.802379][ T2962] program syz-executor.1 not setting count and/or reply_len properly 00:55:45 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000000)={0x1, 0x2, @start}) 00:55:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:55:46 executing program 1: write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="00000000d50104000000000100000000dcdf6c68a94a86bf9084baa574fc14950000680000010060000048d24f33b3e6fbdfc5ba39fb37489122dc864fa4373263e640082f6a67fb671c8cee80a4dba19eb1d80f02b2bcfc18848a3076cc49f420417c4410192ed7f503e1a0d3f19a377a3d92e602230a035f528d7deaa69c7b7fa03cd1367af3d826acf0c7f2e06d59ba5287cb2b87805c24ca4387bc20e729a6b2fcab9f7f74181428327d14cc6f4409c5f38e181738df158086e890aeb8ae8575668f17adf39fdb207f3bfa195fdc528550d5c5a5b0faa86b502e18845e9e3eb47450a39b3ce50da97c3e8b4ecd3a77abc94ba83072765e401fa492604b9398aab00675706a08e61ecc75a740de8d1a82686ebd67133996a53bc113860056078d"], 0x122) fstat(0xffffffffffffffff, &(0x7f0000000340)) [ 1162.912768][ T2944] memory: usage 119392kB, limit 0kB, failcnt 8 [ 1162.918992][ T2944] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1163.017344][ T2944] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1163.036519][ T2981] sg_write: data in/out 262577/248 bytes for SCSI command 0x0-- guessing data in; [ 1163.036519][ T2981] program syz-executor.1 not setting count and/or reply_len properly [ 1163.130647][T15195] block nbd0: Receive control failed (result -22) [ 1163.181245][ T2944] Memory cgroup stats for /syz0: cache:260KB rss:107484KB rss_huge:102400KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:107348KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1163.322278][ T2944] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=1488,uid=0 [ 1163.420275][ T2944] Memory cgroup out of memory: Killed process 1488 (syz-executor.0) total-vm:72844kB, anon-rss:6328kB, file-rss:35812kB, shmem-rss:0kB [ 1163.441445][ T2970] block nbd0: shutting down sockets [ 1163.540741][ T2942] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1163.577405][ T2942] CPU: 0 PID: 2942 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1163.585426][ T2942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1163.595480][ T2942] Call Trace: [ 1163.599128][ T2942] dump_stack+0x172/0x1f0 [ 1163.603467][ T2942] dump_header+0x10f/0xb6c [ 1163.607897][ T2942] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1163.613727][ T2942] ? ___ratelimit+0x60/0x595 [ 1163.618523][ T2942] ? do_raw_spin_unlock+0x57/0x270 [ 1163.623736][ T2942] oom_kill_process.cold+0x10/0x15 [ 1163.628861][ T2942] out_of_memory+0x79a/0x1280 [ 1163.633550][ T2942] ? oom_killer_disable+0x280/0x280 [ 1163.638752][ T2942] ? find_held_lock+0x35/0x130 [ 1163.643531][ T2942] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1163.649079][ T2942] ? memcg_event_wake+0x230/0x230 [ 1163.654202][ T2942] ? do_raw_spin_unlock+0x57/0x270 [ 1163.659319][ T2942] ? _raw_spin_unlock+0x2d/0x50 [ 1163.664181][ T2942] try_charge+0x102c/0x15c0 [ 1163.668706][ T2942] ? find_held_lock+0x35/0x130 [ 1163.673483][ T2942] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1163.679107][ T2942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1163.685413][ T2942] ? kasan_check_read+0x11/0x20 [ 1163.690280][ T2942] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1163.695835][ T2942] mem_cgroup_try_charge+0x24d/0x5e0 [ 1163.701137][ T2942] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1163.706858][ T2942] __handle_mm_fault+0x1e1f/0x3ec0 [ 1163.711996][ T2942] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1163.717544][ T2942] ? find_held_lock+0x35/0x130 [ 1163.722313][ T2942] ? handle_mm_fault+0x322/0xb30 [ 1163.727266][ T2942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1163.733937][ T2942] ? kasan_check_read+0x11/0x20 [ 1163.738798][ T2942] handle_mm_fault+0x43f/0xb30 [ 1163.743675][ T2942] __do_page_fault+0x5ef/0xda0 [ 1163.748466][ T2942] do_page_fault+0x71/0x581 [ 1163.752975][ T2942] ? page_fault+0x8/0x30 [ 1163.757333][ T2942] page_fault+0x1e/0x30 [ 1163.761490][ T2942] RIP: 0033:0x4107bf [ 1163.765397][ T2942] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 1163.785007][ T2942] RSP: 002b:00007fff74838e40 EFLAGS: 00010206 [ 1163.791076][ T2942] RAX: 00007f9315ea1000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 1163.799053][ T2942] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 1163.807032][ T2942] RBP: 00007fff74838f20 R08: ffffffffffffffff R09: 0000000000000000 [ 1163.815052][ T2942] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff74839010 [ 1163.823061][ T2942] R13: 00007f9315ec1700 R14: 0000000000000001 R15: 000000000073bfac [ 1163.971115][ T2942] memory: usage 113000kB, limit 0kB, failcnt 8 [ 1163.977392][ T2942] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1164.001148][ T2942] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1164.008146][ T2942] Memory cgroup stats for /syz0: cache:260KB rss:101260KB rss_huge:96256KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:101128KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1164.061311][ T2942] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=1491,uid=0 [ 1164.102961][ T2942] Memory cgroup out of memory: Killed process 1491 (syz-executor.0) total-vm:72712kB, anon-rss:6320kB, file-rss:34816kB, shmem-rss:0kB [ 1164.177723][ T2942] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1164.201169][ T2942] CPU: 1 PID: 2942 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1164.209123][ T2942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1164.219184][ T2942] Call Trace: [ 1164.222499][ T2942] dump_stack+0x172/0x1f0 [ 1164.227463][ T2942] dump_header+0x10f/0xb6c [ 1164.231897][ T2942] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1164.237711][ T2942] ? ___ratelimit+0x60/0x595 [ 1164.242394][ T2942] ? do_raw_spin_unlock+0x57/0x270 [ 1164.247516][ T2942] oom_kill_process.cold+0x10/0x15 [ 1164.252729][ T2942] out_of_memory+0x79a/0x1280 [ 1164.257414][ T2942] ? lock_downgrade+0x880/0x880 [ 1164.262307][ T2942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1164.268553][ T2942] ? oom_killer_disable+0x280/0x280 [ 1164.273758][ T2942] ? find_held_lock+0x35/0x130 [ 1164.278565][ T2942] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1164.284120][ T2942] ? memcg_event_wake+0x230/0x230 [ 1164.289160][ T2942] ? do_raw_spin_unlock+0x57/0x270 [ 1164.294397][ T2942] ? _raw_spin_unlock+0x2d/0x50 [ 1164.299252][ T2942] try_charge+0x102c/0x15c0 [ 1164.303772][ T2942] ? find_held_lock+0x35/0x130 [ 1164.308557][ T2942] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1164.314708][ T2942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1164.320990][ T2942] ? kasan_check_read+0x11/0x20 [ 1164.325851][ T2942] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1164.331411][ T2942] mem_cgroup_try_charge+0x24d/0x5e0 [ 1164.336791][ T2942] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1164.342441][ T2942] __handle_mm_fault+0x1e1f/0x3ec0 [ 1164.347560][ T2942] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1164.353106][ T2942] ? find_held_lock+0x35/0x130 [ 1164.357876][ T2942] ? handle_mm_fault+0x322/0xb30 [ 1164.362838][ T2942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1164.369183][ T2942] ? kasan_check_read+0x11/0x20 [ 1164.374427][ T2942] handle_mm_fault+0x43f/0xb30 [ 1164.379205][ T2942] __do_page_fault+0x5ef/0xda0 [ 1164.383984][ T2942] do_page_fault+0x71/0x581 [ 1164.388490][ T2942] ? page_fault+0x8/0x30 [ 1164.392737][ T2942] page_fault+0x1e/0x30 [ 1164.396894][ T2942] RIP: 0033:0x4107bf [ 1164.400792][ T2942] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 1164.420402][ T2942] RSP: 002b:00007fff74838e40 EFLAGS: 00010206 [ 1164.426481][ T2942] RAX: 00007f9315ea1000 RBX: 0000000000020000 RCX: 0000000000458dfa [ 1164.434458][ T2942] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 1164.442440][ T2942] RBP: 00007fff74838f20 R08: ffffffffffffffff R09: 0000000000000000 [ 1164.450418][ T2942] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff74839010 [ 1164.458390][ T2942] R13: 00007f9315ec1700 R14: 0000000000000001 R15: 000000000073bfac [ 1164.486101][ T2942] memory: usage 106592kB, limit 0kB, failcnt 14 [ 1164.521109][ T2942] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1164.528620][ T2942] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1164.562031][ T2942] Memory cgroup stats for /syz0: cache:260KB rss:95044KB rss_huge:90112KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:94880KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1164.656759][ T2942] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=29472,uid=0 [ 1164.721129][ T2942] Memory cgroup out of memory: Killed process 29472 (syz-executor.0) total-vm:72448kB, anon-rss:4256kB, file-rss:35828kB, shmem-rss:0kB [ 1164.839452][ T2944] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1164.898844][ T2944] CPU: 0 PID: 2944 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1164.906781][ T2944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1164.916841][ T2944] Call Trace: [ 1164.920151][ T2944] dump_stack+0x172/0x1f0 [ 1164.924502][ T2944] dump_header+0x10f/0xb6c [ 1164.928954][ T2944] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1164.934785][ T2944] ? ___ratelimit+0x60/0x595 [ 1164.939390][ T2944] ? do_raw_spin_unlock+0x57/0x270 [ 1164.944520][ T2944] oom_kill_process.cold+0x10/0x15 [ 1164.949680][ T2944] out_of_memory+0x79a/0x1280 [ 1164.954384][ T2944] ? oom_killer_disable+0x280/0x280 [ 1164.959603][ T2944] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1164.965153][ T2944] ? memcg_event_wake+0x230/0x230 [ 1164.970191][ T2944] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1164.976003][ T2944] ? cgroup_file_notify+0x140/0x1b0 [ 1164.981211][ T2944] memory_max_write+0x169/0x300 [ 1164.986074][ T2944] ? mem_cgroup_write+0x360/0x360 [ 1164.991102][ T2944] ? mem_cgroup_write+0x360/0x360 [ 1164.996144][ T2944] cgroup_file_write+0x245/0x7a0 [ 1165.001088][ T2944] ? mem_cgroup_write+0x360/0x360 [ 1165.006116][ T2944] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1165.011760][ T2944] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1165.017395][ T2944] kernfs_fop_write+0x2ba/0x480 [ 1165.022259][ T2944] __vfs_write+0x8d/0x110 [ 1165.026590][ T2944] ? kernfs_fop_open+0xd90/0xd90 [ 1165.031579][ T2944] vfs_write+0x20c/0x580 [ 1165.035836][ T2944] ksys_write+0x14f/0x2d0 [ 1165.040171][ T2944] ? __ia32_sys_read+0xb0/0xb0 [ 1165.044952][ T2944] __x64_sys_write+0x73/0xb0 [ 1165.049566][ T2944] ? do_syscall_64+0x5b/0x610 [ 1165.054249][ T2944] do_syscall_64+0x103/0x610 [ 1165.058852][ T2944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.064749][ T2944] RIP: 0033:0x458da9 [ 1165.068648][ T2944] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1165.088467][ T2944] RSP: 002b:00007f9315ee1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1165.097411][ T2944] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 1165.105388][ T2944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1165.113361][ T2944] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1165.121335][ T2944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9315ee26d4 [ 1165.129310][ T2944] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 1165.251127][ T2944] memory: usage 102224kB, limit 0kB, failcnt 28 [ 1165.257434][ T2944] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1165.301093][ T2944] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1165.307999][ T2944] Memory cgroup stats for /syz0: cache:260KB rss:90828KB rss_huge:86016KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:90684KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1165.421092][ T2944] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=29448,uid=0 [ 1165.481151][ T2944] Memory cgroup out of memory: Killed process 29448 (syz-executor.0) total-vm:72580kB, anon-rss:4264kB, file-rss:35796kB, shmem-rss:0kB [ 1165.549896][ T1043] oom_reaper: reaped process 29448 (syz-executor.0), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 1165.751709][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1165.811096][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1165.819146][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1165.829204][ T7797] Call Trace: [ 1165.832502][ T7797] dump_stack+0x172/0x1f0 [ 1165.836839][ T7797] dump_header+0x10f/0xb6c [ 1165.841262][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1165.847087][ T7797] ? ___ratelimit+0x60/0x595 [ 1165.851707][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1165.856840][ T7797] oom_kill_process.cold+0x10/0x15 [ 1165.862509][ T7797] out_of_memory+0x79a/0x1280 [ 1165.867197][ T7797] ? oom_killer_disable+0x280/0x280 [ 1165.872435][ T7797] ? find_held_lock+0x35/0x130 [ 1165.877212][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1165.882763][ T7797] ? memcg_event_wake+0x230/0x230 [ 1165.887793][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1165.892924][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1165.897801][ T7797] try_charge+0xa87/0x15c0 [ 1165.902220][ T7797] ? find_held_lock+0x35/0x130 [ 1165.906991][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1165.912542][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1165.918792][ T7797] ? kasan_check_read+0x11/0x20 [ 1165.923763][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1165.929405][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1165.934715][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1165.941396][ T7797] wp_page_copy+0x408/0x1740 [ 1165.945985][ T7797] ? find_held_lock+0x35/0x130 [ 1165.950755][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1165.955006][ T7797] ? lock_downgrade+0x880/0x880 [ 1165.959864][ T7797] ? swp_swapcount+0x540/0x540 [ 1165.964647][ T7797] ? kasan_check_read+0x11/0x20 [ 1165.969519][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1165.974641][ T7797] do_wp_page+0x48e/0x1500 [ 1165.979082][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1165.984473][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1165.989595][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1165.995147][ T7797] ? find_held_lock+0x35/0x130 [ 1165.999917][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1166.004870][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1166.011118][ T7797] ? kasan_check_read+0x11/0x20 [ 1166.015977][ T7797] handle_mm_fault+0x43f/0xb30 [ 1166.020751][ T7797] __do_page_fault+0x5ef/0xda0 [ 1166.025525][ T7797] do_page_fault+0x71/0x581 [ 1166.030035][ T7797] ? page_fault+0x8/0x30 [ 1166.034279][ T7797] page_fault+0x1e/0x30 [ 1166.038434][ T7797] RIP: 0033:0x42ff3a [ 1166.042335][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1166.061949][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1166.068033][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1166.076047][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1166.084026][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1166.092005][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1166.099986][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1166.191140][ T7797] memory: usage 95612kB, limit 0kB, failcnt 29 [ 1166.197497][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1166.271070][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1166.278056][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:84532KB rss_huge:79872KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:84324KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1166.426830][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10853,uid=0 [ 1166.528712][ T7797] Memory cgroup out of memory: Killed process 10853 (syz-executor.0) total-vm:72580kB, anon-rss:4256kB, file-rss:34816kB, shmem-rss:0kB [ 1166.686636][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1166.746626][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1166.754582][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1166.764646][ T7797] Call Trace: [ 1166.767959][ T7797] dump_stack+0x172/0x1f0 [ 1166.772302][ T7797] dump_header+0x10f/0xb6c [ 1166.776915][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1166.782736][ T7797] ? ___ratelimit+0x60/0x595 [ 1166.787335][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1166.792459][ T7797] oom_kill_process.cold+0x10/0x15 [ 1166.797581][ T7797] out_of_memory+0x79a/0x1280 [ 1166.802267][ T7797] ? lock_downgrade+0x880/0x880 [ 1166.807142][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1166.813391][ T7797] ? oom_killer_disable+0x280/0x280 [ 1166.818594][ T7797] ? find_held_lock+0x35/0x130 [ 1166.823373][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1166.828927][ T7797] ? memcg_event_wake+0x230/0x230 [ 1166.833963][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1166.839104][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1166.844006][ T7797] try_charge+0x102c/0x15c0 [ 1166.848526][ T7797] ? find_held_lock+0x35/0x130 [ 1166.853318][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1166.858883][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1166.865147][ T7797] ? kasan_check_read+0x11/0x20 [ 1166.870019][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1166.875585][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1166.880976][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1166.886621][ T7797] wp_page_copy+0x408/0x1740 [ 1166.891234][ T7797] ? find_held_lock+0x35/0x130 [ 1166.896032][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1166.900282][ T7797] ? lock_downgrade+0x880/0x880 [ 1166.905134][ T7797] ? swp_swapcount+0x540/0x540 [ 1166.909905][ T7797] ? kasan_check_read+0x11/0x20 [ 1166.914766][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1166.919892][ T7797] do_wp_page+0x48e/0x1500 [ 1166.924324][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1166.929714][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1166.934864][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1166.940414][ T7797] ? find_held_lock+0x35/0x130 [ 1166.945201][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1166.950165][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1166.956603][ T7797] ? kasan_check_read+0x11/0x20 [ 1166.961472][ T7797] handle_mm_fault+0x43f/0xb30 [ 1166.966358][ T7797] __do_page_fault+0x5ef/0xda0 [ 1166.971226][ T7797] do_page_fault+0x71/0x581 [ 1166.975742][ T7797] ? page_fault+0x8/0x30 [ 1166.979993][ T7797] page_fault+0x1e/0x30 [ 1166.984257][ T7797] RIP: 0033:0x42ff3a [ 1166.988154][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1167.007786][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1167.013867][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1167.022564][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1167.030544][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1167.038549][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1167.046792][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1167.911182][ T7797] memory: usage 90912kB, limit 0kB, failcnt 35 [ 1167.917389][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1167.951089][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1167.957979][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:80272KB rss_huge:75776KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:80132KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1168.031884][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10848,uid=0 [ 1168.061944][ T7797] Memory cgroup out of memory: Killed process 10848 (syz-executor.0) total-vm:72448kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB [ 1168.143729][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1168.154992][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1168.162988][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1168.173045][ T7797] Call Trace: [ 1168.176355][ T7797] dump_stack+0x172/0x1f0 [ 1168.180711][ T7797] dump_header+0x10f/0xb6c [ 1168.185310][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1168.191134][ T7797] ? ___ratelimit+0x60/0x595 [ 1168.195905][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1168.201024][ T7797] oom_kill_process.cold+0x10/0x15 [ 1168.206150][ T7797] out_of_memory+0x79a/0x1280 [ 1168.210839][ T7797] ? lock_downgrade+0x880/0x880 [ 1168.215706][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1168.221953][ T7797] ? oom_killer_disable+0x280/0x280 [ 1168.227149][ T7797] ? find_held_lock+0x35/0x130 [ 1168.231922][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1168.237466][ T7797] ? memcg_event_wake+0x230/0x230 [ 1168.242494][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1168.247610][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1168.252463][ T7797] try_charge+0x102c/0x15c0 [ 1168.256964][ T7797] ? find_held_lock+0x35/0x130 [ 1168.261740][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1168.267292][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1168.273536][ T7797] ? kasan_check_read+0x11/0x20 [ 1168.278400][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1168.283976][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1168.292510][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1168.298149][ T7797] wp_page_copy+0x408/0x1740 [ 1168.302746][ T7797] ? find_held_lock+0x35/0x130 [ 1168.307516][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1168.311764][ T7797] ? lock_downgrade+0x880/0x880 [ 1168.316614][ T7797] ? swp_swapcount+0x540/0x540 [ 1168.321385][ T7797] ? kasan_check_read+0x11/0x20 [ 1168.326236][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1168.331353][ T7797] do_wp_page+0x48e/0x1500 [ 1168.335774][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1168.341243][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1168.346538][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1168.352085][ T7797] ? find_held_lock+0x35/0x130 [ 1168.356854][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1168.361807][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1168.368052][ T7797] ? kasan_check_read+0x11/0x20 [ 1168.372910][ T7797] handle_mm_fault+0x43f/0xb30 [ 1168.377720][ T7797] __do_page_fault+0x5ef/0xda0 [ 1168.382496][ T7797] do_page_fault+0x71/0x581 [ 1168.387007][ T7797] ? page_fault+0x8/0x30 [ 1168.391254][ T7797] page_fault+0x1e/0x30 [ 1168.395406][ T7797] RIP: 0033:0x42ff3a [ 1168.399302][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1168.418916][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1168.425077][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1168.433144][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1168.441117][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1168.449175][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1168.457146][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1168.496790][ T7797] memory: usage 86556kB, limit 0kB, failcnt 41 [ 1168.516765][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1168.531133][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1168.538015][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:76072KB rss_huge:71680KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:75936KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1168.601079][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10880,uid=0 [ 1168.631208][ T7797] Memory cgroup out of memory: Killed process 10880 (syz-executor.0) total-vm:72448kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB [ 1168.708738][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1168.731120][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1168.739068][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1168.749164][ T7797] Call Trace: [ 1168.752469][ T7797] dump_stack+0x172/0x1f0 [ 1168.756811][ T7797] dump_header+0x10f/0xb6c [ 1168.761235][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1168.767050][ T7797] ? ___ratelimit+0x60/0x595 [ 1168.771650][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1168.776780][ T7797] oom_kill_process.cold+0x10/0x15 [ 1168.781994][ T7797] out_of_memory+0x79a/0x1280 [ 1168.786687][ T7797] ? lock_downgrade+0x880/0x880 [ 1168.791542][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1168.797789][ T7797] ? oom_killer_disable+0x280/0x280 [ 1168.802993][ T7797] ? find_held_lock+0x35/0x130 [ 1168.807771][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1168.813323][ T7797] ? memcg_event_wake+0x230/0x230 [ 1168.818360][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1168.823478][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1168.828335][ T7797] try_charge+0x102c/0x15c0 [ 1168.832843][ T7797] ? find_held_lock+0x35/0x130 [ 1168.837621][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1168.843197][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1168.849448][ T7797] ? kasan_check_read+0x11/0x20 [ 1168.854315][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1168.860253][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1168.865552][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1168.871200][ T7797] wp_page_copy+0x408/0x1740 [ 1168.875794][ T7797] ? find_held_lock+0x35/0x130 [ 1168.880576][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1168.884831][ T7797] ? lock_downgrade+0x880/0x880 [ 1168.889709][ T7797] ? swp_swapcount+0x540/0x540 [ 1168.894490][ T7797] ? kasan_check_read+0x11/0x20 [ 1168.899344][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1168.904462][ T7797] do_wp_page+0x48e/0x1500 [ 1168.908891][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1168.914278][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1168.919401][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1168.924952][ T7797] ? find_held_lock+0x35/0x130 [ 1168.929722][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1168.934686][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1168.940945][ T7797] ? kasan_check_read+0x11/0x20 [ 1168.945808][ T7797] handle_mm_fault+0x43f/0xb30 [ 1168.950582][ T7797] __do_page_fault+0x5ef/0xda0 [ 1168.955356][ T7797] do_page_fault+0x71/0x581 [ 1168.959884][ T7797] ? page_fault+0x8/0x30 [ 1168.964133][ T7797] page_fault+0x1e/0x30 [ 1168.968304][ T7797] RIP: 0033:0x42ff3a [ 1168.972208][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1168.991830][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1168.997904][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1169.005887][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1169.013862][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1169.021836][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1169.029906][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1169.351087][ T7797] memory: usage 82164kB, limit 0kB, failcnt 47 [ 1169.357305][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1169.381078][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1169.387979][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:71872KB rss_huge:67584KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:71740KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1169.441092][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10904,uid=0 [ 1169.471138][ T7797] Memory cgroup out of memory: Killed process 10904 (syz-executor.0) total-vm:72448kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB [ 1169.502816][ T1043] oom_reaper: reaped process 10904 (syz-executor.0), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1169.523592][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1169.546944][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1169.554890][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1169.564953][ T7797] Call Trace: [ 1169.568252][ T7797] dump_stack+0x172/0x1f0 [ 1169.572590][ T7797] dump_header+0x10f/0xb6c [ 1169.577012][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1169.582911][ T7797] ? ___ratelimit+0x60/0x595 [ 1169.587502][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1169.592618][ T7797] oom_kill_process.cold+0x10/0x15 [ 1169.597731][ T7797] out_of_memory+0x79a/0x1280 [ 1169.602412][ T7797] ? lock_downgrade+0x880/0x880 [ 1169.607263][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1169.613510][ T7797] ? oom_killer_disable+0x280/0x280 [ 1169.618719][ T7797] ? find_held_lock+0x35/0x130 [ 1169.623498][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1169.629049][ T7797] ? memcg_event_wake+0x230/0x230 [ 1169.634084][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1169.639290][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1169.644144][ T7797] try_charge+0x102c/0x15c0 [ 1169.648774][ T7797] ? find_held_lock+0x35/0x130 [ 1169.653553][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1169.659104][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1169.665358][ T7797] ? kasan_check_read+0x11/0x20 [ 1169.670223][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1169.675779][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1169.681075][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1169.686722][ T7797] wp_page_copy+0x408/0x1740 [ 1169.691319][ T7797] ? find_held_lock+0x35/0x130 [ 1169.696090][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1169.700344][ T7797] ? lock_downgrade+0x880/0x880 [ 1169.705203][ T7797] ? swp_swapcount+0x540/0x540 [ 1169.709973][ T7797] ? kasan_check_read+0x11/0x20 [ 1169.714834][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1169.719952][ T7797] do_wp_page+0x48e/0x1500 [ 1169.724641][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1169.730034][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1169.735162][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1169.740801][ T7797] ? find_held_lock+0x35/0x130 [ 1169.745684][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1169.750631][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1169.756885][ T7797] ? kasan_check_read+0x11/0x20 [ 1169.761742][ T7797] handle_mm_fault+0x43f/0xb30 [ 1169.766522][ T7797] __do_page_fault+0x5ef/0xda0 [ 1169.771297][ T7797] do_page_fault+0x71/0x581 [ 1169.775802][ T7797] ? page_fault+0x8/0x30 [ 1169.780057][ T7797] page_fault+0x1e/0x30 [ 1169.784225][ T7797] RIP: 0033:0x42ff3a [ 1169.788128][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1169.807747][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1169.813823][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1169.821890][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1169.829900][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1169.837882][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1169.846260][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1169.871992][ T7797] memory: usage 77772kB, limit 0kB, failcnt 71 [ 1169.878342][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1169.921084][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1169.928073][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:67676KB rss_huge:63488KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:67544KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1170.001078][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=10923,uid=0 [ 1170.031138][ T7797] Memory cgroup out of memory: Killed process 10923 (syz-executor.0) total-vm:72448kB, anon-rss:4248kB, file-rss:34816kB, shmem-rss:0kB [ 1170.113034][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1170.131205][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1170.139580][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1170.149751][ T7797] Call Trace: [ 1170.153232][ T7797] dump_stack+0x172/0x1f0 [ 1170.157597][ T7797] dump_header+0x10f/0xb6c [ 1170.162033][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1170.167861][ T7797] ? ___ratelimit+0x60/0x595 [ 1170.172608][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1170.177759][ T7797] oom_kill_process.cold+0x10/0x15 [ 1170.183081][ T7797] out_of_memory+0x79a/0x1280 [ 1170.188156][ T7797] ? lock_downgrade+0x880/0x880 [ 1170.193114][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1170.199833][ T7797] ? oom_killer_disable+0x280/0x280 [ 1170.205225][ T7797] ? find_held_lock+0x35/0x130 [ 1170.210231][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1170.216504][ T7797] ? memcg_event_wake+0x230/0x230 [ 1170.221765][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1170.227023][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1170.232628][ T7797] try_charge+0x102c/0x15c0 [ 1170.237423][ T7797] ? find_held_lock+0x35/0x130 [ 1170.242523][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1170.249015][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1170.256530][ T7797] ? kasan_check_read+0x11/0x20 [ 1170.263604][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1170.270472][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1170.278095][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1170.285607][ T7797] wp_page_copy+0x408/0x1740 [ 1170.293824][ T7797] ? find_held_lock+0x35/0x130 [ 1170.300506][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1170.305475][ T7797] ? lock_downgrade+0x880/0x880 [ 1170.310611][ T7797] ? swp_swapcount+0x540/0x540 [ 1170.316045][ T7797] ? kasan_check_read+0x11/0x20 [ 1170.321388][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1170.327493][ T7797] do_wp_page+0x48e/0x1500 [ 1170.333856][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1170.339931][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1170.345737][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1170.353032][ T7797] ? find_held_lock+0x35/0x130 [ 1170.359633][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1170.365703][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1170.375258][ T7797] ? kasan_check_read+0x11/0x20 [ 1170.382131][ T7797] handle_mm_fault+0x43f/0xb30 [ 1170.388165][ T7797] __do_page_fault+0x5ef/0xda0 [ 1170.393290][ T7797] do_page_fault+0x71/0x581 [ 1170.398080][ T7797] ? page_fault+0x8/0x30 [ 1170.402934][ T7797] page_fault+0x1e/0x30 [ 1170.407574][ T7797] RIP: 0033:0x42ff3a [ 1170.412738][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1170.436289][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1170.443164][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1170.451340][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1170.464774][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1170.473625][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1170.482763][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1170.499352][ T7797] memory: usage 73148kB, limit 0kB, failcnt 77 [ 1170.514081][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1170.523198][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1170.530876][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:63456KB rss_huge:59392KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:63316KB inactive_file:0KB active_file:0KB unevictable:128KB [ 1170.561570][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18715,uid=0 [ 1170.579590][ T7797] Memory cgroup out of memory: Killed process 18715 (syz-executor.0) total-vm:72580kB, anon-rss:2240kB, file-rss:35832kB, shmem-rss:0kB [ 1170.631258][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1170.661143][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1170.672196][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1170.693427][ T7797] Call Trace: [ 1170.697531][ T7797] dump_stack+0x172/0x1f0 [ 1170.702241][ T7797] dump_header+0x10f/0xb6c [ 1170.706870][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1170.713776][ T7797] ? ___ratelimit+0x60/0x595 [ 1170.720297][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1170.728009][ T7797] oom_kill_process.cold+0x10/0x15 [ 1170.735706][ T7797] out_of_memory+0x79a/0x1280 [ 1170.741028][ T7797] ? lock_downgrade+0x880/0x880 [ 1170.746588][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1170.753900][ T7797] ? oom_killer_disable+0x280/0x280 [ 1170.759909][ T7797] ? find_held_lock+0x35/0x130 [ 1170.765843][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1170.773098][ T7797] ? memcg_event_wake+0x230/0x230 [ 1170.778820][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1170.784402][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1170.791448][ T7797] try_charge+0x102c/0x15c0 [ 1170.797639][ T7797] ? find_held_lock+0x35/0x130 [ 1170.803515][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1170.809196][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1170.815964][ T7797] ? kasan_check_read+0x11/0x20 [ 1170.821042][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1170.827006][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1170.833094][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1170.839338][ T7797] wp_page_copy+0x408/0x1740 [ 1170.844181][ T7797] ? find_held_lock+0x35/0x130 [ 1170.849576][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1170.853878][ T7797] ? lock_downgrade+0x880/0x880 [ 1170.858836][ T7797] ? swp_swapcount+0x540/0x540 [ 1170.863631][ T7797] ? kasan_check_read+0x11/0x20 [ 1170.868541][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1170.873853][ T7797] do_wp_page+0x48e/0x1500 [ 1170.878382][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1170.884023][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1170.889750][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1170.895502][ T7797] ? find_held_lock+0x35/0x130 [ 1170.900588][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1170.905555][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1170.912052][ T7797] ? kasan_check_read+0x11/0x20 [ 1170.917717][ T7797] handle_mm_fault+0x43f/0xb30 [ 1170.923159][ T7797] __do_page_fault+0x5ef/0xda0 [ 1170.929273][ T7797] do_page_fault+0x71/0x581 [ 1170.934167][ T7797] ? page_fault+0x8/0x30 [ 1170.939286][ T7797] page_fault+0x1e/0x30 [ 1170.944073][ T7797] RIP: 0033:0x42ff3a [ 1170.947991][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1170.969107][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1170.976401][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1170.985390][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1170.995219][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1171.003789][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1171.012715][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1171.381517][ T7797] memory: usage 70724kB, limit 0kB, failcnt 83 [ 1171.387978][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1171.411075][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1171.418316][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:61296KB rss_huge:57344KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:61156KB inactive_file:0KB active_file:0KB unevictable:64KB [ 1171.491928][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18776,uid=0 [ 1171.531136][ T7797] Memory cgroup out of memory: Killed process 18776 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35828kB, shmem-rss:0kB [ 1171.591582][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1171.621915][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1171.630295][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1171.640738][ T7797] Call Trace: [ 1171.644243][ T7797] dump_stack+0x172/0x1f0 [ 1171.648867][ T7797] dump_header+0x10f/0xb6c [ 1171.653956][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1171.660253][ T7797] ? ___ratelimit+0x60/0x595 [ 1171.665228][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1171.670565][ T7797] oom_kill_process.cold+0x10/0x15 [ 1171.676407][ T7797] out_of_memory+0x79a/0x1280 [ 1171.681110][ T7797] ? lock_downgrade+0x880/0x880 [ 1171.685984][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1171.692925][ T7797] ? oom_killer_disable+0x280/0x280 [ 1171.698460][ T7797] ? find_held_lock+0x35/0x130 [ 1171.703377][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1171.709022][ T7797] ? memcg_event_wake+0x230/0x230 [ 1171.714161][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1171.719388][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1171.724741][ T7797] try_charge+0x102c/0x15c0 [ 1171.729355][ T7797] ? find_held_lock+0x35/0x130 [ 1171.734241][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1171.740127][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1171.746851][ T7797] ? kasan_check_read+0x11/0x20 [ 1171.751823][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1171.757490][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1171.763471][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1171.769258][ T7797] wp_page_copy+0x408/0x1740 [ 1171.774047][ T7797] ? find_held_lock+0x35/0x130 [ 1171.779441][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1171.783732][ T7797] ? lock_downgrade+0x880/0x880 [ 1171.789233][ T7797] ? swp_swapcount+0x540/0x540 [ 1171.794115][ T7797] ? kasan_check_read+0x11/0x20 [ 1171.799103][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1171.804247][ T7797] do_wp_page+0x48e/0x1500 [ 1171.808805][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1171.815124][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1171.820268][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1171.826512][ T7797] ? find_held_lock+0x35/0x130 [ 1171.831519][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1171.836986][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1171.843397][ T7797] ? kasan_check_read+0x11/0x20 [ 1171.848738][ T7797] handle_mm_fault+0x43f/0xb30 [ 1171.853744][ T7797] __do_page_fault+0x5ef/0xda0 [ 1171.858739][ T7797] do_page_fault+0x71/0x581 [ 1171.864074][ T7797] ? page_fault+0x8/0x30 [ 1171.868770][ T7797] page_fault+0x1e/0x30 [ 1171.873222][ T7797] RIP: 0033:0x42ff3a [ 1171.877223][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1171.897912][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1171.904159][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1171.912610][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1171.920895][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1171.929733][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1171.937983][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1172.106969][ T7797] memory: usage 68396kB, limit 0kB, failcnt 89 [ 1172.126900][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1172.146887][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1172.161120][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:59148KB rss_huge:55296KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:59008KB inactive_file:0KB active_file:0KB unevictable:64KB [ 1172.211076][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18708,uid=0 [ 1172.241152][ T7797] Memory cgroup out of memory: Killed process 18708 (syz-executor.0) total-vm:72448kB, anon-rss:2212kB, file-rss:35804kB, shmem-rss:0kB [ 1172.273530][ T1043] oom_reaper: reaped process 18708 (syz-executor.0), now anon-rss:44kB, file-rss:34844kB, shmem-rss:0kB [ 1172.306859][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1172.341096][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1172.349432][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1172.359591][ T7797] Call Trace: [ 1172.363305][ T7797] dump_stack+0x172/0x1f0 [ 1172.367830][ T7797] dump_header+0x10f/0xb6c [ 1172.372542][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1172.378456][ T7797] ? ___ratelimit+0x60/0x595 [ 1172.383183][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1172.389090][ T7797] oom_kill_process.cold+0x10/0x15 [ 1172.394237][ T7797] out_of_memory+0x79a/0x1280 [ 1172.399077][ T7797] ? lock_downgrade+0x880/0x880 [ 1172.404348][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1172.411172][ T7797] ? oom_killer_disable+0x280/0x280 [ 1172.416489][ T7797] ? find_held_lock+0x35/0x130 [ 1172.421593][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1172.427240][ T7797] ? memcg_event_wake+0x230/0x230 [ 1172.432469][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1172.437602][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1172.442487][ T7797] try_charge+0x102c/0x15c0 [ 1172.447286][ T7797] ? find_held_lock+0x35/0x130 [ 1172.452085][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1172.457695][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1172.464204][ T7797] ? kasan_check_read+0x11/0x20 [ 1172.469428][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1172.475015][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1172.480712][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1172.489138][ T7797] wp_page_copy+0x408/0x1740 [ 1172.493985][ T7797] ? find_held_lock+0x35/0x130 [ 1172.498888][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1172.503187][ T7797] ? lock_downgrade+0x880/0x880 [ 1172.508149][ T7797] ? swp_swapcount+0x540/0x540 [ 1172.513111][ T7797] ? kasan_check_read+0x11/0x20 [ 1172.517993][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1172.523925][ T7797] do_wp_page+0x48e/0x1500 [ 1172.528403][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1172.534012][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1172.539253][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1172.544992][ T7797] ? find_held_lock+0x35/0x130 [ 1172.550276][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1172.555553][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1172.562081][ T7797] ? kasan_check_read+0x11/0x20 [ 1172.567745][ T7797] handle_mm_fault+0x43f/0xb30 [ 1172.572621][ T7797] __do_page_fault+0x5ef/0xda0 [ 1172.578496][ T7797] do_page_fault+0x71/0x581 [ 1172.583201][ T7797] ? page_fault+0x8/0x30 [ 1172.587737][ T7797] page_fault+0x1e/0x30 [ 1172.591908][ T7797] RIP: 0033:0x42ff3a [ 1172.595860][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1172.616858][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1172.623273][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1172.631355][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1172.639827][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1172.648268][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1172.656365][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1172.821084][ T7797] memory: usage 66004kB, limit 0kB, failcnt 119 [ 1172.827734][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1172.881129][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1172.888132][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:56844KB rss_huge:53248KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:56860KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1172.987107][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=17236,uid=0 [ 1173.027718][ T7797] Memory cgroup out of memory: Killed process 17236 (syz-executor.0) total-vm:72712kB, anon-rss:2224kB, file-rss:35788kB, shmem-rss:0kB [ 1173.133379][ T1043] oom_reaper: reaped process 17236 (syz-executor.0), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 1173.153708][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1173.191130][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1173.199789][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1173.211279][ T7797] Call Trace: [ 1173.215092][ T7797] dump_stack+0x172/0x1f0 [ 1173.219740][ T7797] dump_header+0x10f/0xb6c [ 1173.224851][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1173.232903][ T7797] ? ___ratelimit+0x60/0x595 [ 1173.238151][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1173.243500][ T7797] oom_kill_process.cold+0x10/0x15 [ 1173.248905][ T7797] out_of_memory+0x79a/0x1280 [ 1173.254928][ T7797] ? lock_downgrade+0x880/0x880 [ 1173.260417][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.267300][ T7797] ? oom_killer_disable+0x280/0x280 [ 1173.272554][ T7797] ? find_held_lock+0x35/0x130 [ 1173.277977][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1173.284227][ T7797] ? memcg_event_wake+0x230/0x230 [ 1173.291737][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1173.298174][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1173.304029][ T7797] try_charge+0x102c/0x15c0 [ 1173.308905][ T7797] ? find_held_lock+0x35/0x130 [ 1173.313873][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1173.319952][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.329759][ T7797] ? kasan_check_read+0x11/0x20 [ 1173.337596][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1173.344587][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1173.350815][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1173.357183][ T7797] wp_page_copy+0x408/0x1740 [ 1173.362168][ T7797] ? find_held_lock+0x35/0x130 [ 1173.366967][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1173.371327][ T7797] ? lock_downgrade+0x880/0x880 [ 1173.377137][ T7797] ? swp_swapcount+0x540/0x540 [ 1173.382766][ T7797] ? kasan_check_read+0x11/0x20 [ 1173.388268][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1173.393713][ T7797] do_wp_page+0x48e/0x1500 [ 1173.398343][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1173.404191][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1173.410183][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1173.416987][ T7797] ? find_held_lock+0x35/0x130 [ 1173.422411][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1173.427994][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1173.434572][ T7797] ? kasan_check_read+0x11/0x20 [ 1173.439689][ T7797] handle_mm_fault+0x43f/0xb30 [ 1173.445739][ T7797] __do_page_fault+0x5ef/0xda0 [ 1173.450807][ T7797] do_page_fault+0x71/0x581 [ 1173.455331][ T7797] ? page_fault+0x8/0x30 [ 1173.459950][ T7797] page_fault+0x1e/0x30 [ 1173.464213][ T7797] RIP: 0033:0x42ff3a [ 1173.469085][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1173.495471][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1173.502518][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1173.511153][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1173.519605][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1173.528045][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1173.536226][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1173.682058][ T7797] memory: usage 63588kB, limit 0kB, failcnt 125 [ 1173.707030][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1173.751112][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1173.758303][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:54692KB rss_huge:51200KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:54692KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1173.827536][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19082,uid=0 [ 1173.867121][ T7797] Memory cgroup out of memory: Killed process 19082 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35800kB, shmem-rss:0kB [ 1173.961318][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1173.999097][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1174.008079][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1174.019150][ T7797] Call Trace: [ 1174.022836][ T7797] dump_stack+0x172/0x1f0 [ 1174.027389][ T7797] dump_header+0x10f/0xb6c [ 1174.032986][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1174.038906][ T7797] ? ___ratelimit+0x60/0x595 [ 1174.044431][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1174.050299][ T7797] oom_kill_process.cold+0x10/0x15 [ 1174.056313][ T7797] out_of_memory+0x79a/0x1280 [ 1174.061294][ T7797] ? lock_downgrade+0x880/0x880 [ 1174.066467][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.072918][ T7797] ? oom_killer_disable+0x280/0x280 [ 1174.078333][ T7797] ? find_held_lock+0x35/0x130 [ 1174.083757][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1174.090058][ T7797] ? memcg_event_wake+0x230/0x230 [ 1174.095241][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1174.100749][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1174.106900][ T7797] try_charge+0x102c/0x15c0 [ 1174.111510][ T7797] ? find_held_lock+0x35/0x130 [ 1174.116534][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1174.122123][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.128495][ T7797] ? kasan_check_read+0x11/0x20 [ 1174.133637][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1174.139559][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1174.145402][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1174.151376][ T7797] wp_page_copy+0x408/0x1740 [ 1174.156725][ T7797] ? find_held_lock+0x35/0x130 [ 1174.161752][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1174.166518][ T7797] ? lock_downgrade+0x880/0x880 [ 1174.172746][ T7797] ? swp_swapcount+0x540/0x540 [ 1174.178268][ T7797] ? kasan_check_read+0x11/0x20 [ 1174.183849][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1174.189955][ T7797] do_wp_page+0x48e/0x1500 [ 1174.195620][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1174.202652][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1174.210763][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1174.218094][ T7797] ? find_held_lock+0x35/0x130 [ 1174.223145][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1174.228381][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.235542][ T7797] ? kasan_check_read+0x11/0x20 [ 1174.240780][ T7797] handle_mm_fault+0x43f/0xb30 [ 1174.245881][ T7797] __do_page_fault+0x5ef/0xda0 [ 1174.251157][ T7797] do_page_fault+0x71/0x581 [ 1174.255897][ T7797] ? page_fault+0x8/0x30 [ 1174.260885][ T7797] page_fault+0x1e/0x30 [ 1174.265164][ T7797] RIP: 0033:0x42ff3a [ 1174.269602][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1174.289879][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1174.296413][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1174.307329][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1174.315705][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1174.324316][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1174.333323][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1174.521150][ T7797] memory: usage 61264kB, limit 0kB, failcnt 131 [ 1174.527592][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1174.561109][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1174.568733][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:52552KB rss_huge:49152KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:52532KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1174.651096][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=28785,uid=0 [ 1174.681145][ T7797] Memory cgroup out of memory: Killed process 28785 (syz-executor.0) total-vm:72580kB, anon-rss:2216kB, file-rss:35792kB, shmem-rss:0kB [ 1174.722620][ T1043] oom_reaper: reaped process 28785 (syz-executor.0), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 1174.755999][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1174.781076][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1174.789336][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1174.799703][ T7797] Call Trace: [ 1174.804068][ T7797] dump_stack+0x172/0x1f0 [ 1174.808569][ T7797] dump_header+0x10f/0xb6c [ 1174.813386][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1174.819489][ T7797] ? ___ratelimit+0x60/0x595 [ 1174.824507][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1174.829990][ T7797] oom_kill_process.cold+0x10/0x15 [ 1174.835264][ T7797] out_of_memory+0x79a/0x1280 [ 1174.840171][ T7797] ? lock_downgrade+0x880/0x880 [ 1174.846184][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.852628][ T7797] ? oom_killer_disable+0x280/0x280 [ 1174.858235][ T7797] ? find_held_lock+0x35/0x130 [ 1174.863229][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1174.869152][ T7797] ? memcg_event_wake+0x230/0x230 [ 1174.874813][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1174.880187][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1174.885493][ T7797] try_charge+0x102c/0x15c0 [ 1174.890612][ T7797] ? find_held_lock+0x35/0x130 [ 1174.895580][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1174.901159][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1174.907899][ T7797] ? kasan_check_read+0x11/0x20 [ 1174.912786][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1174.918443][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1174.923862][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1174.929852][ T7797] wp_page_copy+0x408/0x1740 [ 1174.934552][ T7797] ? find_held_lock+0x35/0x130 [ 1174.939342][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1174.943960][ T7797] ? lock_downgrade+0x880/0x880 [ 1174.949780][ T7797] ? swp_swapcount+0x540/0x540 [ 1174.955547][ T7797] ? kasan_check_read+0x11/0x20 [ 1174.961141][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1174.966976][ T7797] do_wp_page+0x48e/0x1500 [ 1174.971931][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1174.977723][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1174.982868][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1174.988550][ T7797] ? find_held_lock+0x35/0x130 [ 1174.993346][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1174.998405][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1175.005716][ T7797] ? kasan_check_read+0x11/0x20 [ 1175.011121][ T7797] handle_mm_fault+0x43f/0xb30 [ 1175.016293][ T7797] __do_page_fault+0x5ef/0xda0 [ 1175.021179][ T7797] do_page_fault+0x71/0x581 [ 1175.025744][ T7797] ? page_fault+0x8/0x30 [ 1175.030343][ T7797] page_fault+0x1e/0x30 [ 1175.034602][ T7797] RIP: 0033:0x42ff3a [ 1175.038515][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1175.059970][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1175.066397][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1175.074603][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1175.083555][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1175.092152][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1175.100324][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1175.501128][ T7797] memory: usage 58556kB, limit 0kB, failcnt 155 [ 1175.507797][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1175.531088][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1175.538164][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:50384KB rss_huge:47104KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:50372KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1175.611093][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=28823,uid=0 [ 1175.641131][ T7797] Memory cgroup out of memory: Killed process 28823 (syz-executor.0) total-vm:72580kB, anon-rss:2216kB, file-rss:35792kB, shmem-rss:0kB [ 1175.713777][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1175.741125][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1175.749056][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1175.759550][ T7797] Call Trace: [ 1175.762883][ T7797] dump_stack+0x172/0x1f0 [ 1175.767327][ T7797] dump_header+0x10f/0xb6c [ 1175.771850][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1175.777686][ T7797] ? ___ratelimit+0x60/0x595 [ 1175.782571][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1175.787870][ T7797] oom_kill_process.cold+0x10/0x15 [ 1175.792991][ T7797] out_of_memory+0x79a/0x1280 [ 1175.797691][ T7797] ? lock_downgrade+0x880/0x880 [ 1175.802685][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1175.808961][ T7797] ? oom_killer_disable+0x280/0x280 [ 1175.814515][ T7797] ? find_held_lock+0x35/0x130 [ 1175.819393][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1175.825039][ T7797] ? memcg_event_wake+0x230/0x230 [ 1175.830079][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1175.835196][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1175.840052][ T7797] try_charge+0x102c/0x15c0 [ 1175.844564][ T7797] ? find_held_lock+0x35/0x130 [ 1175.849369][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1175.854931][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1175.861849][ T7797] ? kasan_check_read+0x11/0x20 [ 1175.866715][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1175.872273][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1175.877564][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1175.883567][ T7797] wp_page_copy+0x408/0x1740 [ 1175.888859][ T7797] ? find_held_lock+0x35/0x130 [ 1175.893727][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1175.897997][ T7797] ? lock_downgrade+0x880/0x880 [ 1175.902942][ T7797] ? swp_swapcount+0x540/0x540 [ 1175.907718][ T7797] ? kasan_check_read+0x11/0x20 [ 1175.912757][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1175.918239][ T7797] do_wp_page+0x48e/0x1500 [ 1175.924036][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1175.929436][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1175.934704][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1175.940270][ T7797] ? find_held_lock+0x35/0x130 [ 1175.945106][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1175.950257][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1175.956520][ T7797] ? kasan_check_read+0x11/0x20 [ 1175.961411][ T7797] handle_mm_fault+0x43f/0xb30 [ 1175.966354][ T7797] __do_page_fault+0x5ef/0xda0 [ 1175.971220][ T7797] do_page_fault+0x71/0x581 [ 1175.975735][ T7797] ? page_fault+0x8/0x30 [ 1175.980177][ T7797] page_fault+0x1e/0x30 [ 1175.984516][ T7797] RIP: 0033:0x42ff3a [ 1175.988603][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1176.008953][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1176.015029][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1176.023094][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1176.031068][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1176.039054][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1176.047049][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1176.281140][ T7797] memory: usage 56204kB, limit 0kB, failcnt 161 [ 1176.287443][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1176.321085][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1176.327979][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:48208KB rss_huge:45056KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:48180KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1176.481127][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=17287,uid=0 [ 1176.511149][ T7797] Memory cgroup out of memory: Killed process 17287 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35796kB, shmem-rss:0kB [ 1176.542603][ T1043] oom_reaper: reaped process 17287 (syz-executor.0), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 1176.571554][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1176.591534][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1176.599454][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1176.609517][ T7797] Call Trace: [ 1176.612823][ T7797] dump_stack+0x172/0x1f0 [ 1176.617251][ T7797] dump_header+0x10f/0xb6c [ 1176.621695][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1176.627612][ T7797] ? ___ratelimit+0x60/0x595 [ 1176.632313][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1176.637440][ T7797] oom_kill_process.cold+0x10/0x15 [ 1176.642755][ T7797] out_of_memory+0x79a/0x1280 [ 1176.647523][ T7797] ? lock_downgrade+0x880/0x880 [ 1176.652379][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1176.658776][ T7797] ? oom_killer_disable+0x280/0x280 [ 1176.664245][ T7797] ? find_held_lock+0x35/0x130 [ 1176.669031][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1176.674802][ T7797] ? memcg_event_wake+0x230/0x230 [ 1176.679848][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1176.687672][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1176.692908][ T7797] try_charge+0x102c/0x15c0 [ 1176.697423][ T7797] ? find_held_lock+0x35/0x130 [ 1176.702231][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1176.707884][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1176.714236][ T7797] ? kasan_check_read+0x11/0x20 [ 1176.719102][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1176.724655][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1176.730495][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1176.736149][ T7797] wp_page_copy+0x408/0x1740 [ 1176.740750][ T7797] ? find_held_lock+0x35/0x130 [ 1176.745525][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1176.749774][ T7797] ? lock_downgrade+0x880/0x880 [ 1176.754632][ T7797] ? swp_swapcount+0x540/0x540 [ 1176.760452][ T7797] ? kasan_check_read+0x11/0x20 [ 1176.765395][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1176.770607][ T7797] do_wp_page+0x48e/0x1500 [ 1176.775048][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1176.780440][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1176.785583][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1176.791585][ T7797] ? find_held_lock+0x35/0x130 [ 1176.796451][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1176.801684][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1176.807939][ T7797] ? kasan_check_read+0x11/0x20 [ 1176.812981][ T7797] handle_mm_fault+0x43f/0xb30 [ 1176.817843][ T7797] __do_page_fault+0x5ef/0xda0 [ 1176.822626][ T7797] do_page_fault+0x71/0x581 [ 1176.827232][ T7797] ? page_fault+0x8/0x30 [ 1176.832092][ T7797] page_fault+0x1e/0x30 [ 1176.836425][ T7797] RIP: 0033:0x42ff3a [ 1176.840410][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1176.860802][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1176.867937][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1176.876017][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1176.884112][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1176.892088][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1176.900244][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1177.601095][ T7797] memory: usage 53848kB, limit 0kB, failcnt 179 [ 1177.607392][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1177.641082][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1177.647994][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:46052KB rss_huge:43008KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:46032KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1177.692008][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=17321,uid=0 [ 1177.726046][ T7797] Memory cgroup out of memory: Killed process 17321 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35796kB, shmem-rss:0kB [ 1177.772527][ T1043] oom_reaper: reaped process 17321 (syz-executor.0), now anon-rss:0kB, file-rss:34836kB, shmem-rss:0kB [ 1177.798560][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1177.836866][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1177.844801][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.854858][ T7797] Call Trace: [ 1177.858154][ T7797] dump_stack+0x172/0x1f0 [ 1177.862905][ T7797] dump_header+0x10f/0xb6c [ 1177.867333][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1177.873150][ T7797] ? ___ratelimit+0x60/0x595 [ 1177.877782][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1177.884672][ T7797] oom_kill_process.cold+0x10/0x15 [ 1177.889985][ T7797] out_of_memory+0x79a/0x1280 [ 1177.895237][ T7797] ? lock_downgrade+0x880/0x880 [ 1177.900740][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1177.907076][ T7797] ? oom_killer_disable+0x280/0x280 [ 1177.912283][ T7797] ? find_held_lock+0x35/0x130 [ 1177.917059][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1177.922609][ T7797] ? memcg_event_wake+0x230/0x230 [ 1177.927640][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1177.932765][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1177.937628][ T7797] try_charge+0x102c/0x15c0 [ 1177.942141][ T7797] ? find_held_lock+0x35/0x130 [ 1177.946911][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1177.952460][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1177.958714][ T7797] ? kasan_check_read+0x11/0x20 [ 1177.963670][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1177.969239][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1177.974547][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1177.980204][ T7797] wp_page_copy+0x408/0x1740 [ 1177.984922][ T7797] ? find_held_lock+0x35/0x130 [ 1177.989709][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1177.993966][ T7797] ? lock_downgrade+0x880/0x880 [ 1177.998824][ T7797] ? swp_swapcount+0x540/0x540 [ 1178.003626][ T7797] ? kasan_check_read+0x11/0x20 [ 1178.008504][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1178.013620][ T7797] do_wp_page+0x48e/0x1500 [ 1178.018069][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1178.023461][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1178.028580][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1178.034126][ T7797] ? find_held_lock+0x35/0x130 [ 1178.038891][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1178.043858][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1178.050114][ T7797] ? kasan_check_read+0x11/0x20 [ 1178.054971][ T7797] handle_mm_fault+0x43f/0xb30 [ 1178.059742][ T7797] __do_page_fault+0x5ef/0xda0 [ 1178.064518][ T7797] do_page_fault+0x71/0x581 [ 1178.069023][ T7797] ? page_fault+0x8/0x30 [ 1178.073271][ T7797] page_fault+0x1e/0x30 [ 1178.077423][ T7797] RIP: 0033:0x42ff3a [ 1178.081317][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1178.100925][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1178.106997][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1178.114967][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1178.122935][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1178.130903][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1178.138870][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1178.211137][ T7797] memory: usage 51520kB, limit 0kB, failcnt 185 [ 1178.217427][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1178.241078][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1178.247948][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:43892KB rss_huge:40960KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:43872KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1178.321072][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=17327,uid=0 [ 1178.351123][ T7797] Memory cgroup out of memory: Killed process 17327 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35796kB, shmem-rss:0kB [ 1178.421967][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1178.441163][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1178.449067][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.459117][ T7797] Call Trace: [ 1178.462416][ T7797] dump_stack+0x172/0x1f0 [ 1178.466761][ T7797] dump_header+0x10f/0xb6c [ 1178.471182][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1178.476995][ T7797] ? ___ratelimit+0x60/0x595 [ 1178.481588][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1178.486702][ T7797] oom_kill_process.cold+0x10/0x15 [ 1178.491816][ T7797] out_of_memory+0x79a/0x1280 [ 1178.496499][ T7797] ? lock_downgrade+0x880/0x880 [ 1178.501350][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1178.507594][ T7797] ? oom_killer_disable+0x280/0x280 [ 1178.512804][ T7797] ? find_held_lock+0x35/0x130 [ 1178.517578][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1178.523122][ T7797] ? memcg_event_wake+0x230/0x230 [ 1178.528152][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1178.533268][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1178.538125][ T7797] try_charge+0x102c/0x15c0 [ 1178.542643][ T7797] ? find_held_lock+0x35/0x130 [ 1178.547424][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1178.552976][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1178.559226][ T7797] ? kasan_check_read+0x11/0x20 [ 1178.564081][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1178.569637][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1178.574936][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1178.580578][ T7797] wp_page_copy+0x408/0x1740 [ 1178.585171][ T7797] ? find_held_lock+0x35/0x130 [ 1178.589946][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1178.594189][ T7797] ? lock_downgrade+0x880/0x880 [ 1178.599354][ T7797] ? swp_swapcount+0x540/0x540 [ 1178.604122][ T7797] ? kasan_check_read+0x11/0x20 [ 1178.610017][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1178.615137][ T7797] do_wp_page+0x48e/0x1500 [ 1178.619564][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1178.624947][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1178.630063][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1178.635606][ T7797] ? find_held_lock+0x35/0x130 [ 1178.640374][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1178.645321][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1178.651597][ T7797] ? kasan_check_read+0x11/0x20 [ 1178.656452][ T7797] handle_mm_fault+0x43f/0xb30 [ 1178.661226][ T7797] __do_page_fault+0x5ef/0xda0 [ 1178.666000][ T7797] do_page_fault+0x71/0x581 [ 1178.670506][ T7797] ? page_fault+0x8/0x30 [ 1178.674750][ T7797] page_fault+0x1e/0x30 [ 1178.678945][ T7797] RIP: 0033:0x42ff3a [ 1178.682866][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1178.708119][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1178.714188][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1178.722163][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1178.730682][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1178.738655][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1178.746635][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1179.207217][ T7797] memory: usage 49180kB, limit 0kB, failcnt 191 [ 1179.221107][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1179.228574][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1179.251053][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:41720KB rss_huge:38912KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:41692KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1179.301102][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24090,uid=0 [ 1179.331122][ T7797] Memory cgroup out of memory: Killed process 24090 (syz-executor.0) total-vm:72580kB, anon-rss:2216kB, file-rss:35788kB, shmem-rss:0kB [ 1179.403950][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1179.421135][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1179.429033][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.439083][ T7797] Call Trace: [ 1179.442378][ T7797] dump_stack+0x172/0x1f0 [ 1179.446717][ T7797] dump_header+0x10f/0xb6c [ 1179.451137][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1179.456946][ T7797] ? ___ratelimit+0x60/0x595 [ 1179.461540][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1179.466656][ T7797] oom_kill_process.cold+0x10/0x15 [ 1179.471786][ T7797] out_of_memory+0x79a/0x1280 [ 1179.476463][ T7797] ? lock_downgrade+0x880/0x880 [ 1179.481321][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1179.487670][ T7797] ? oom_killer_disable+0x280/0x280 [ 1179.492875][ T7797] ? find_held_lock+0x35/0x130 [ 1179.497649][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1179.503205][ T7797] ? memcg_event_wake+0x230/0x230 [ 1179.508236][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1179.513347][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1179.518198][ T7797] try_charge+0x102c/0x15c0 [ 1179.522707][ T7797] ? find_held_lock+0x35/0x130 [ 1179.527482][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1179.533031][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1179.539281][ T7797] ? kasan_check_read+0x11/0x20 [ 1179.544138][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1179.549692][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1179.554993][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1179.560627][ T7797] wp_page_copy+0x408/0x1740 [ 1179.565220][ T7797] ? find_held_lock+0x35/0x130 [ 1179.569990][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1179.574233][ T7797] ? lock_downgrade+0x880/0x880 [ 1179.579086][ T7797] ? swp_swapcount+0x540/0x540 [ 1179.583857][ T7797] ? kasan_check_read+0x11/0x20 [ 1179.588714][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1179.593831][ T7797] do_wp_page+0x48e/0x1500 [ 1179.598259][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1179.603639][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1179.608765][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1179.614313][ T7797] ? find_held_lock+0x35/0x130 [ 1179.619077][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1179.624026][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1179.630290][ T7797] ? kasan_check_read+0x11/0x20 [ 1179.635169][ T7797] handle_mm_fault+0x43f/0xb30 [ 1179.639941][ T7797] __do_page_fault+0x5ef/0xda0 [ 1179.644719][ T7797] do_page_fault+0x71/0x581 [ 1179.649230][ T7797] ? page_fault+0x8/0x30 [ 1179.653484][ T7797] page_fault+0x1e/0x30 [ 1179.657634][ T7797] RIP: 0033:0x42ff3a [ 1179.661536][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1179.681141][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1179.687211][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1179.695185][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1179.703160][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1179.711134][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1179.719108][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1179.811127][ T7797] memory: usage 46620kB, limit 0kB, failcnt 197 [ 1179.817432][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1179.857105][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1179.881071][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:39540KB rss_huge:36864KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:39520KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1179.961076][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8872,uid=0 [ 1180.003020][ T7797] Memory cgroup out of memory: Killed process 8872 (syz-executor.0) total-vm:72448kB, anon-rss:2200kB, file-rss:35800kB, shmem-rss:0kB [ 1180.142925][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1180.171073][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1180.179081][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.190182][ T7797] Call Trace: [ 1180.193499][ T7797] dump_stack+0x172/0x1f0 [ 1180.197849][ T7797] dump_header+0x10f/0xb6c [ 1180.202279][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1180.208116][ T7797] ? ___ratelimit+0x60/0x595 [ 1180.212706][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1180.217824][ T7797] oom_kill_process.cold+0x10/0x15 [ 1180.222937][ T7797] out_of_memory+0x79a/0x1280 [ 1180.227617][ T7797] ? lock_downgrade+0x880/0x880 [ 1180.232471][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1180.238714][ T7797] ? oom_killer_disable+0x280/0x280 [ 1180.243910][ T7797] ? find_held_lock+0x35/0x130 [ 1180.248694][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1180.254240][ T7797] ? memcg_event_wake+0x230/0x230 [ 1180.259276][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1180.264390][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1180.269248][ T7797] try_charge+0x102c/0x15c0 [ 1180.273749][ T7797] ? find_held_lock+0x35/0x130 [ 1180.278523][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1180.284074][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1180.290318][ T7797] ? kasan_check_read+0x11/0x20 [ 1180.295174][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1180.300732][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1180.306033][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1180.311680][ T7797] wp_page_copy+0x408/0x1740 [ 1180.316272][ T7797] ? find_held_lock+0x35/0x130 [ 1180.321059][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1180.325303][ T7797] ? lock_downgrade+0x880/0x880 [ 1180.330158][ T7797] ? swp_swapcount+0x540/0x540 [ 1180.334930][ T7797] ? kasan_check_read+0x11/0x20 [ 1180.339782][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1180.344899][ T7797] do_wp_page+0x48e/0x1500 [ 1180.349325][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1180.354712][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1180.359832][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1180.365376][ T7797] ? find_held_lock+0x35/0x130 [ 1180.370139][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1180.375091][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1180.381337][ T7797] ? kasan_check_read+0x11/0x20 [ 1180.386192][ T7797] handle_mm_fault+0x43f/0xb30 [ 1180.390964][ T7797] __do_page_fault+0x5ef/0xda0 [ 1180.395735][ T7797] do_page_fault+0x71/0x581 [ 1180.400242][ T7797] ? page_fault+0x8/0x30 [ 1180.404488][ T7797] page_fault+0x1e/0x30 [ 1180.408639][ T7797] RIP: 0033:0x42ff3a [ 1180.412542][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1180.432147][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1180.438218][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1180.446187][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1180.454289][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1180.462258][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1180.470225][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1180.927097][ T7797] memory: usage 44312kB, limit 0kB, failcnt 203 [ 1180.946557][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1180.966709][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1180.986690][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:37384KB rss_huge:34816KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:37372KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1181.042961][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8879,uid=0 [ 1181.084950][ T7797] Memory cgroup out of memory: Killed process 8879 (syz-executor.0) total-vm:72448kB, anon-rss:2200kB, file-rss:35800kB, shmem-rss:0kB [ 1181.173845][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1181.205824][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1181.213794][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.223861][ T7797] Call Trace: [ 1181.227170][ T7797] dump_stack+0x172/0x1f0 [ 1181.231515][ T7797] dump_header+0x10f/0xb6c [ 1181.235937][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1181.241752][ T7797] ? ___ratelimit+0x60/0x595 [ 1181.246342][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1181.251463][ T7797] oom_kill_process.cold+0x10/0x15 [ 1181.256588][ T7797] out_of_memory+0x79a/0x1280 [ 1181.261443][ T7797] ? lock_downgrade+0x880/0x880 [ 1181.266298][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1181.272551][ T7797] ? oom_killer_disable+0x280/0x280 [ 1181.277769][ T7797] ? find_held_lock+0x35/0x130 [ 1181.282554][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1181.288104][ T7797] ? memcg_event_wake+0x230/0x230 [ 1181.293146][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1181.298260][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1181.303118][ T7797] try_charge+0x102c/0x15c0 [ 1181.307621][ T7797] ? find_held_lock+0x35/0x130 [ 1181.312397][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1181.317943][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1181.324190][ T7797] ? kasan_check_read+0x11/0x20 [ 1181.329050][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1181.334601][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1181.339894][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1181.345546][ T7797] wp_page_copy+0x408/0x1740 [ 1181.350139][ T7797] ? find_held_lock+0x35/0x130 [ 1181.354915][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1181.359159][ T7797] ? lock_downgrade+0x880/0x880 [ 1181.364017][ T7797] ? swp_swapcount+0x540/0x540 [ 1181.368787][ T7797] ? kasan_check_read+0x11/0x20 [ 1181.373642][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1181.378764][ T7797] do_wp_page+0x48e/0x1500 [ 1181.383187][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1181.388583][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1181.393706][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1181.399249][ T7797] ? find_held_lock+0x35/0x130 [ 1181.404015][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1181.409141][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1181.415387][ T7797] ? kasan_check_read+0x11/0x20 [ 1181.420246][ T7797] handle_mm_fault+0x43f/0xb30 [ 1181.425017][ T7797] __do_page_fault+0x5ef/0xda0 [ 1181.429793][ T7797] do_page_fault+0x71/0x581 [ 1181.434301][ T7797] ? page_fault+0x8/0x30 [ 1181.438547][ T7797] page_fault+0x1e/0x30 [ 1181.442699][ T7797] RIP: 0033:0x42ff3a [ 1181.446594][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1181.466308][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1181.472399][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1181.480377][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1181.488441][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1181.496418][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1181.504393][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1181.911244][ T7797] memory: usage 41988kB, limit 0kB, failcnt 209 [ 1181.917532][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1181.951065][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1181.957956][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:35236KB rss_huge:32768KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:35224KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1182.036765][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19859,uid=0 [ 1182.086604][ T7797] Memory cgroup out of memory: Killed process 19859 (syz-executor.0) total-vm:72580kB, anon-rss:2216kB, file-rss:35784kB, shmem-rss:0kB [ 1182.129472][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1182.167052][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1182.174988][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.185044][ T7797] Call Trace: [ 1182.188344][ T7797] dump_stack+0x172/0x1f0 [ 1182.192685][ T7797] dump_header+0x10f/0xb6c [ 1182.197109][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1182.202933][ T7797] ? ___ratelimit+0x60/0x595 [ 1182.207527][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1182.212641][ T7797] oom_kill_process.cold+0x10/0x15 [ 1182.217763][ T7797] out_of_memory+0x79a/0x1280 [ 1182.222446][ T7797] ? lock_downgrade+0x880/0x880 [ 1182.227298][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1182.233542][ T7797] ? oom_killer_disable+0x280/0x280 [ 1182.238745][ T7797] ? find_held_lock+0x35/0x130 [ 1182.243522][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1182.249244][ T7797] ? memcg_event_wake+0x230/0x230 [ 1182.254279][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1182.259392][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1182.264255][ T7797] try_charge+0x102c/0x15c0 [ 1182.268767][ T7797] ? find_held_lock+0x35/0x130 [ 1182.273545][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1182.279102][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1182.285350][ T7797] ? kasan_check_read+0x11/0x20 [ 1182.290214][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1182.295768][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1182.301090][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1182.306731][ T7797] wp_page_copy+0x408/0x1740 [ 1182.311325][ T7797] ? find_held_lock+0x35/0x130 [ 1182.316103][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1182.320348][ T7797] ? lock_downgrade+0x880/0x880 [ 1182.325208][ T7797] ? swp_swapcount+0x540/0x540 [ 1182.329976][ T7797] ? kasan_check_read+0x11/0x20 [ 1182.334830][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1182.339949][ T7797] do_wp_page+0x48e/0x1500 [ 1182.344375][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1182.349757][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1182.354875][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1182.360420][ T7797] ? find_held_lock+0x35/0x130 [ 1182.365272][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1182.370394][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1182.376638][ T7797] ? kasan_check_read+0x11/0x20 [ 1182.381503][ T7797] handle_mm_fault+0x43f/0xb30 [ 1182.386272][ T7797] __do_page_fault+0x5ef/0xda0 [ 1182.391051][ T7797] do_page_fault+0x71/0x581 [ 1182.395559][ T7797] ? page_fault+0x8/0x30 [ 1182.399801][ T7797] page_fault+0x1e/0x30 [ 1182.403952][ T7797] RIP: 0033:0x42ff3a [ 1182.407846][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1182.427456][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1182.433522][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1182.441494][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1182.449464][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1182.457433][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1182.465405][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1182.611920][ T7797] memory: usage 39660kB, limit 0kB, failcnt 215 [ 1182.618264][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1182.651064][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1182.657943][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:33076KB rss_huge:30720KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:33064KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1182.721073][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8889,uid=0 [ 1182.761130][ T7797] Memory cgroup out of memory: Killed process 8889 (syz-executor.0) total-vm:72448kB, anon-rss:2200kB, file-rss:35796kB, shmem-rss:0kB [ 1182.838531][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1182.861091][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1182.868996][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.879062][ T7797] Call Trace: [ 1182.882404][ T7797] dump_stack+0x172/0x1f0 [ 1182.886746][ T7797] dump_header+0x10f/0xb6c [ 1182.891199][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1182.897016][ T7797] ? ___ratelimit+0x60/0x595 [ 1182.901610][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1182.906729][ T7797] oom_kill_process.cold+0x10/0x15 [ 1182.911859][ T7797] out_of_memory+0x79a/0x1280 [ 1182.916539][ T7797] ? lock_downgrade+0x880/0x880 [ 1182.921392][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1182.927638][ T7797] ? oom_killer_disable+0x280/0x280 [ 1182.932845][ T7797] ? find_held_lock+0x35/0x130 [ 1182.937619][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1182.943165][ T7797] ? memcg_event_wake+0x230/0x230 [ 1182.948196][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1182.953310][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1182.958163][ T7797] try_charge+0x102c/0x15c0 [ 1182.962693][ T7797] ? find_held_lock+0x35/0x130 [ 1182.967478][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1182.973028][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1182.979311][ T7797] ? kasan_check_read+0x11/0x20 [ 1182.984199][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1182.989780][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1182.995073][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1183.000723][ T7797] wp_page_copy+0x408/0x1740 [ 1183.005400][ T7797] ? find_held_lock+0x35/0x130 [ 1183.010172][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1183.014419][ T7797] ? lock_downgrade+0x880/0x880 [ 1183.019298][ T7797] ? swp_swapcount+0x540/0x540 [ 1183.024079][ T7797] ? kasan_check_read+0x11/0x20 [ 1183.028946][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1183.034087][ T7797] do_wp_page+0x48e/0x1500 [ 1183.038515][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1183.043904][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1183.049022][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1183.054569][ T7797] ? find_held_lock+0x35/0x130 [ 1183.059352][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1183.064342][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1183.070586][ T7797] ? kasan_check_read+0x11/0x20 [ 1183.075473][ T7797] handle_mm_fault+0x43f/0xb30 [ 1183.080241][ T7797] __do_page_fault+0x5ef/0xda0 [ 1183.085014][ T7797] do_page_fault+0x71/0x581 [ 1183.089524][ T7797] ? page_fault+0x8/0x30 [ 1183.093777][ T7797] page_fault+0x1e/0x30 [ 1183.097930][ T7797] RIP: 0033:0x42ff3a [ 1183.101827][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1183.121523][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1183.127599][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1183.135578][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1183.143555][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1183.151525][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1183.159499][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1183.481101][ T7797] memory: usage 37104kB, limit 0kB, failcnt 221 [ 1183.487393][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1183.531152][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1183.538051][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:30896KB rss_huge:28672KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:30884KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1183.601072][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18701,uid=0 [ 1183.651146][ T7797] Memory cgroup out of memory: Killed process 18701 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 1183.682614][ T1043] oom_reaper: reaped process 18701 (syz-executor.0), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 1183.714106][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1183.741097][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1183.749348][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.759407][ T7797] Call Trace: [ 1183.762712][ T7797] dump_stack+0x172/0x1f0 [ 1183.767047][ T7797] dump_header+0x10f/0xb6c [ 1183.771470][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1183.777288][ T7797] ? ___ratelimit+0x60/0x595 [ 1183.781887][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1183.787019][ T7797] oom_kill_process.cold+0x10/0x15 [ 1183.792142][ T7797] out_of_memory+0x79a/0x1280 [ 1183.796848][ T7797] ? lock_downgrade+0x880/0x880 [ 1183.801706][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1183.807965][ T7797] ? oom_killer_disable+0x280/0x280 [ 1183.813257][ T7797] ? find_held_lock+0x35/0x130 [ 1183.818036][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1183.823686][ T7797] ? memcg_event_wake+0x230/0x230 [ 1183.828724][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1183.833841][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1183.838706][ T7797] try_charge+0x102c/0x15c0 [ 1183.843225][ T7797] ? find_held_lock+0x35/0x130 [ 1183.848096][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1183.853659][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1183.860923][ T7797] ? kasan_check_read+0x11/0x20 [ 1183.865792][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1183.871360][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1183.876657][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1183.882311][ T7797] wp_page_copy+0x408/0x1740 [ 1183.886928][ T7797] ? find_held_lock+0x35/0x130 [ 1183.891715][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1183.895973][ T7797] ? lock_downgrade+0x880/0x880 [ 1183.900851][ T7797] ? swp_swapcount+0x540/0x540 [ 1183.905626][ T7797] ? kasan_check_read+0x11/0x20 [ 1183.910498][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1183.915658][ T7797] do_wp_page+0x48e/0x1500 [ 1183.920388][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1183.925873][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1183.931089][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1183.936648][ T7797] ? find_held_lock+0x35/0x130 [ 1183.941466][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1183.946434][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1183.952700][ T7797] ? kasan_check_read+0x11/0x20 [ 1183.957568][ T7797] handle_mm_fault+0x43f/0xb30 [ 1183.962693][ T7797] __do_page_fault+0x5ef/0xda0 [ 1183.967502][ T7797] do_page_fault+0x71/0x581 [ 1183.972021][ T7797] ? page_fault+0x8/0x30 [ 1183.976463][ T7797] page_fault+0x1e/0x30 [ 1183.980621][ T7797] RIP: 0033:0x42ff3a [ 1183.984518][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1184.004481][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1184.011013][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1184.019169][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1184.027158][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1184.035148][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1184.043137][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1184.691095][ T7797] memory: usage 34776kB, limit 0kB, failcnt 245 [ 1184.697746][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1184.721079][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1184.728069][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:28732KB rss_huge:26624KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:28720KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1184.750878][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19039,uid=0 [ 1184.771129][ T7797] Memory cgroup out of memory: Killed process 19039 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 1184.811661][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1184.821746][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1184.829824][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1184.839887][ T7797] Call Trace: [ 1184.843201][ T7797] dump_stack+0x172/0x1f0 [ 1184.847538][ T7797] dump_header+0x10f/0xb6c [ 1184.852053][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1184.857870][ T7797] ? ___ratelimit+0x60/0x595 [ 1184.862465][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1184.867593][ T7797] oom_kill_process.cold+0x10/0x15 [ 1184.872714][ T7797] out_of_memory+0x79a/0x1280 [ 1184.877400][ T7797] ? lock_downgrade+0x880/0x880 [ 1184.882253][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1184.888499][ T7797] ? oom_killer_disable+0x280/0x280 [ 1184.893714][ T7797] ? find_held_lock+0x35/0x130 [ 1184.898491][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1184.904043][ T7797] ? memcg_event_wake+0x230/0x230 [ 1184.909083][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1184.914289][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1184.919156][ T7797] try_charge+0x102c/0x15c0 [ 1184.923657][ T7797] ? find_held_lock+0x35/0x130 [ 1184.928444][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1184.933995][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1184.940241][ T7797] ? kasan_check_read+0x11/0x20 [ 1184.945289][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1184.950842][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1184.956140][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1184.961782][ T7797] wp_page_copy+0x408/0x1740 [ 1184.966372][ T7797] ? find_held_lock+0x35/0x130 [ 1184.971151][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1184.975402][ T7797] ? lock_downgrade+0x880/0x880 [ 1184.980254][ T7797] ? swp_swapcount+0x540/0x540 [ 1184.985026][ T7797] ? kasan_check_read+0x11/0x20 [ 1184.989878][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1184.994997][ T7797] do_wp_page+0x48e/0x1500 [ 1184.999416][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1185.005063][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1185.010183][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1185.015768][ T7797] ? find_held_lock+0x35/0x130 [ 1185.020533][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1185.025482][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1185.031732][ T7797] ? kasan_check_read+0x11/0x20 [ 1185.036589][ T7797] handle_mm_fault+0x43f/0xb30 [ 1185.041360][ T7797] __do_page_fault+0x5ef/0xda0 [ 1185.046134][ T7797] do_page_fault+0x71/0x581 [ 1185.050638][ T7797] ? page_fault+0x8/0x30 [ 1185.054895][ T7797] page_fault+0x1e/0x30 [ 1185.059053][ T7797] RIP: 0033:0x42ff3a [ 1185.062957][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1185.082655][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1185.088740][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1185.096720][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1185.104802][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1185.112782][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1185.120756][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1185.471083][ T7797] memory: usage 32444kB, limit 0kB, failcnt 251 [ 1185.477472][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1185.511085][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1185.517994][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:26564KB rss_huge:24576KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:26548KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1185.585649][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19881,uid=0 [ 1185.626803][ T7797] Memory cgroup out of memory: Killed process 19881 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 1185.672563][ T1043] oom_reaper: reaped process 19881 (syz-executor.0), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 1185.702936][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1185.736695][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1185.744637][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1185.755143][ T7797] Call Trace: [ 1185.758499][ T7797] dump_stack+0x172/0x1f0 [ 1185.763208][ T7797] dump_header+0x10f/0xb6c [ 1185.767641][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1185.773731][ T7797] ? ___ratelimit+0x60/0x595 [ 1185.778411][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1185.783533][ T7797] oom_kill_process.cold+0x10/0x15 [ 1185.789009][ T7797] out_of_memory+0x79a/0x1280 [ 1185.793708][ T7797] ? lock_downgrade+0x880/0x880 [ 1185.798571][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1185.805111][ T7797] ? oom_killer_disable+0x280/0x280 [ 1185.810407][ T7797] ? find_held_lock+0x35/0x130 [ 1185.815205][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1185.820856][ T7797] ? memcg_event_wake+0x230/0x230 [ 1185.825901][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1185.831014][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1185.835868][ T7797] try_charge+0x102c/0x15c0 [ 1185.840368][ T7797] ? find_held_lock+0x35/0x130 [ 1185.845148][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1185.850790][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1185.857133][ T7797] ? kasan_check_read+0x11/0x20 [ 1185.862968][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1185.868528][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1185.873827][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1185.879467][ T7797] wp_page_copy+0x408/0x1740 [ 1185.884082][ T7797] ? find_held_lock+0x35/0x130 [ 1185.888943][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1185.893190][ T7797] ? lock_downgrade+0x880/0x880 [ 1185.898145][ T7797] ? swp_swapcount+0x540/0x540 [ 1185.903009][ T7797] ? kasan_check_read+0x11/0x20 [ 1185.907952][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1185.913344][ T7797] do_wp_page+0x48e/0x1500 [ 1185.917777][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1185.923173][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1185.928305][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1185.933864][ T7797] ? find_held_lock+0x35/0x130 [ 1185.938642][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1185.943610][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1185.949864][ T7797] ? kasan_check_read+0x11/0x20 [ 1185.954731][ T7797] handle_mm_fault+0x43f/0xb30 [ 1185.959513][ T7797] __do_page_fault+0x5ef/0xda0 [ 1185.964292][ T7797] do_page_fault+0x71/0x581 [ 1185.968813][ T7797] ? page_fault+0x8/0x30 [ 1185.973153][ T7797] page_fault+0x1e/0x30 [ 1185.977313][ T7797] RIP: 0033:0x42ff3a [ 1185.981213][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1186.000822][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1186.007072][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1186.015046][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1186.023019][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1186.031017][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1186.038998][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1186.711197][ T7797] memory: usage 30116kB, limit 0kB, failcnt 269 [ 1186.717491][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1186.741088][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1186.749212][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:24412KB rss_huge:22528KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:24400KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1186.801080][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19892,uid=0 [ 1186.831939][ T7797] Memory cgroup out of memory: Killed process 19892 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 1186.862531][ T1043] oom_reaper: reaped process 19892 (syz-executor.0), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 1186.923233][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1186.944625][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1186.952551][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.962703][ T7797] Call Trace: [ 1186.966003][ T7797] dump_stack+0x172/0x1f0 [ 1186.970336][ T7797] dump_header+0x10f/0xb6c [ 1186.974761][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1186.980577][ T7797] ? ___ratelimit+0x60/0x595 [ 1186.985258][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1186.990482][ T7797] oom_kill_process.cold+0x10/0x15 [ 1186.995597][ T7797] out_of_memory+0x79a/0x1280 [ 1187.000298][ T7797] ? lock_downgrade+0x880/0x880 [ 1187.005198][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1187.011463][ T7797] ? oom_killer_disable+0x280/0x280 [ 1187.016659][ T7797] ? find_held_lock+0x35/0x130 [ 1187.021449][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1187.026999][ T7797] ? memcg_event_wake+0x230/0x230 [ 1187.032042][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1187.037154][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1187.042012][ T7797] try_charge+0x102c/0x15c0 [ 1187.046521][ T7797] ? find_held_lock+0x35/0x130 [ 1187.051307][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1187.056869][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1187.063381][ T7797] ? kasan_check_read+0x11/0x20 [ 1187.068251][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1187.073808][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1187.079116][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1187.085023][ T7797] wp_page_copy+0x408/0x1740 [ 1187.089624][ T7797] ? find_held_lock+0x35/0x130 [ 1187.094400][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1187.098645][ T7797] ? lock_downgrade+0x880/0x880 [ 1187.103528][ T7797] ? swp_swapcount+0x540/0x540 [ 1187.108299][ T7797] ? kasan_check_read+0x11/0x20 [ 1187.113162][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1187.118281][ T7797] do_wp_page+0x48e/0x1500 [ 1187.122717][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1187.128113][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1187.133235][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1187.138786][ T7797] ? find_held_lock+0x35/0x130 [ 1187.143569][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1187.148530][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1187.154793][ T7797] ? kasan_check_read+0x11/0x20 [ 1187.159750][ T7797] handle_mm_fault+0x43f/0xb30 [ 1187.164531][ T7797] __do_page_fault+0x5ef/0xda0 [ 1187.169317][ T7797] do_page_fault+0x71/0x581 [ 1187.173841][ T7797] ? page_fault+0x8/0x30 [ 1187.178115][ T7797] page_fault+0x1e/0x30 [ 1187.182799][ T7797] RIP: 0033:0x42ff3a [ 1187.186868][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1187.206482][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1187.212567][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1187.220549][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1187.228528][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1187.236631][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1187.244615][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1187.361119][ T7797] memory: usage 27808kB, limit 0kB, failcnt 317 [ 1187.367416][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1187.401093][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1187.408005][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:22264KB rss_huge:20480KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:22252KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1187.561134][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=19905,uid=0 [ 1187.616780][ T7797] Memory cgroup out of memory: Killed process 19905 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 1187.658084][ T1043] oom_reaper: reaped process 19905 (syz-executor.0), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 1187.682555][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1187.736684][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1187.744622][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1187.754696][ T7797] Call Trace: [ 1187.757996][ T7797] dump_stack+0x172/0x1f0 [ 1187.762425][ T7797] dump_header+0x10f/0xb6c [ 1187.766841][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1187.772650][ T7797] ? ___ratelimit+0x60/0x595 [ 1187.777247][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1187.782380][ T7797] oom_kill_process.cold+0x10/0x15 [ 1187.787502][ T7797] out_of_memory+0x79a/0x1280 [ 1187.792186][ T7797] ? lock_downgrade+0x880/0x880 [ 1187.797439][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1187.803700][ T7797] ? oom_killer_disable+0x280/0x280 [ 1187.808899][ T7797] ? find_held_lock+0x35/0x130 [ 1187.813690][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1187.819239][ T7797] ? memcg_event_wake+0x230/0x230 [ 1187.825323][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1187.830436][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1187.835557][ T7797] try_charge+0x102c/0x15c0 [ 1187.840059][ T7797] ? find_held_lock+0x35/0x130 [ 1187.844832][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1187.850380][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1187.856631][ T7797] ? kasan_check_read+0x11/0x20 [ 1187.862602][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1187.868255][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1187.873642][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1187.879295][ T7797] wp_page_copy+0x408/0x1740 [ 1187.883896][ T7797] ? find_held_lock+0x35/0x130 [ 1187.888696][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1187.892943][ T7797] ? lock_downgrade+0x880/0x880 [ 1187.897808][ T7797] ? swp_swapcount+0x540/0x540 [ 1187.902580][ T7797] ? kasan_check_read+0x11/0x20 [ 1187.907431][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1187.912559][ T7797] do_wp_page+0x48e/0x1500 [ 1187.916989][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1187.922380][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1187.927512][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1187.933061][ T7797] ? find_held_lock+0x35/0x130 [ 1187.937827][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1187.942789][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1187.949041][ T7797] ? kasan_check_read+0x11/0x20 [ 1187.953898][ T7797] handle_mm_fault+0x43f/0xb30 [ 1187.958676][ T7797] __do_page_fault+0x5ef/0xda0 [ 1187.963451][ T7797] do_page_fault+0x71/0x581 [ 1187.967961][ T7797] ? page_fault+0x8/0x30 [ 1187.972213][ T7797] page_fault+0x1e/0x30 [ 1187.976371][ T7797] RIP: 0033:0x42ff3a [ 1187.980269][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1187.999966][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1188.006038][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1188.014007][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1188.021994][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1188.029976][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1188.037955][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1188.181936][ T7797] memory: usage 25296kB, limit 0kB, failcnt 335 [ 1188.188258][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1188.221069][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1188.227964][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:20092KB rss_huge:18432KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:20072KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1188.301079][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24444,uid=0 [ 1188.341138][ T7797] Memory cgroup out of memory: Killed process 24444 (syz-executor.0) total-vm:72712kB, anon-rss:2224kB, file-rss:34816kB, shmem-rss:0kB [ 1188.407938][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1188.431119][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1188.439160][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.449218][ T7797] Call Trace: [ 1188.452520][ T7797] dump_stack+0x172/0x1f0 [ 1188.456861][ T7797] dump_header+0x10f/0xb6c [ 1188.461372][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1188.467182][ T7797] ? ___ratelimit+0x60/0x595 [ 1188.471783][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1188.477166][ T7797] oom_kill_process.cold+0x10/0x15 [ 1188.482282][ T7797] out_of_memory+0x79a/0x1280 [ 1188.486969][ T7797] ? lock_downgrade+0x880/0x880 [ 1188.491837][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1188.498188][ T7797] ? oom_killer_disable+0x280/0x280 [ 1188.503402][ T7797] ? find_held_lock+0x35/0x130 [ 1188.508182][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1188.513731][ T7797] ? memcg_event_wake+0x230/0x230 [ 1188.518777][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1188.523894][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1188.528852][ T7797] try_charge+0x102c/0x15c0 [ 1188.533368][ T7797] ? find_held_lock+0x35/0x130 [ 1188.538212][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1188.543795][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1188.550047][ T7797] ? kasan_check_read+0x11/0x20 [ 1188.554910][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1188.560460][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1188.565759][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1188.571411][ T7797] wp_page_copy+0x408/0x1740 [ 1188.576000][ T7797] ? find_held_lock+0x35/0x130 [ 1188.580780][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1188.585123][ T7797] ? lock_downgrade+0x880/0x880 [ 1188.590167][ T7797] ? swp_swapcount+0x540/0x540 [ 1188.595028][ T7797] ? kasan_check_read+0x11/0x20 [ 1188.599878][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1188.609866][ T7797] do_wp_page+0x48e/0x1500 [ 1188.614327][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1188.619720][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1188.624868][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1188.630439][ T7797] ? find_held_lock+0x35/0x130 [ 1188.635209][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1188.640160][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1188.646407][ T7797] ? kasan_check_read+0x11/0x20 [ 1188.651267][ T7797] handle_mm_fault+0x43f/0xb30 [ 1188.656045][ T7797] __do_page_fault+0x5ef/0xda0 [ 1188.660818][ T7797] do_page_fault+0x71/0x581 [ 1188.665327][ T7797] ? page_fault+0x8/0x30 [ 1188.670034][ T7797] page_fault+0x1e/0x30 [ 1188.674196][ T7797] RIP: 0033:0x42ff3a [ 1188.678119][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1188.703291][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1188.709391][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1188.717382][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1188.725385][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1188.734746][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1188.742757][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1189.081113][ T7797] memory: usage 22980kB, limit 0kB, failcnt 341 [ 1189.087429][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1189.111170][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1189.118583][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:17944KB rss_huge:16384KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:17920KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1189.171119][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24484,uid=0 [ 1189.201152][ T7797] Memory cgroup out of memory: Killed process 24484 (syz-executor.0) total-vm:72712kB, anon-rss:2224kB, file-rss:34816kB, shmem-rss:0kB [ 1189.260122][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1189.281086][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1189.289027][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1189.299273][ T7797] Call Trace: [ 1189.302575][ T7797] dump_stack+0x172/0x1f0 [ 1189.306910][ T7797] dump_header+0x10f/0xb6c [ 1189.311331][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1189.317135][ T7797] ? ___ratelimit+0x60/0x595 [ 1189.321748][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1189.326865][ T7797] oom_kill_process.cold+0x10/0x15 [ 1189.331982][ T7797] out_of_memory+0x79a/0x1280 [ 1189.336671][ T7797] ? lock_downgrade+0x880/0x880 [ 1189.341629][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1189.347896][ T7797] ? oom_killer_disable+0x280/0x280 [ 1189.353114][ T7797] ? find_held_lock+0x35/0x130 [ 1189.357889][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1189.363439][ T7797] ? memcg_event_wake+0x230/0x230 [ 1189.368473][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1189.373587][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1189.378442][ T7797] try_charge+0x102c/0x15c0 [ 1189.382944][ T7797] ? find_held_lock+0x35/0x130 [ 1189.387731][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1189.393287][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1189.399537][ T7797] ? kasan_check_read+0x11/0x20 [ 1189.404398][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1189.409968][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1189.415288][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1189.420957][ T7797] wp_page_copy+0x408/0x1740 [ 1189.425574][ T7797] ? find_held_lock+0x35/0x130 [ 1189.430378][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1189.434641][ T7797] ? lock_downgrade+0x880/0x880 [ 1189.439523][ T7797] ? swp_swapcount+0x540/0x540 [ 1189.444302][ T7797] ? kasan_check_read+0x11/0x20 [ 1189.449167][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1189.454385][ T7797] do_wp_page+0x48e/0x1500 [ 1189.458997][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1189.464381][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1189.469507][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1189.475146][ T7797] ? find_held_lock+0x35/0x130 [ 1189.479936][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1189.484886][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1189.491135][ T7797] ? kasan_check_read+0x11/0x20 [ 1189.495994][ T7797] handle_mm_fault+0x43f/0xb30 [ 1189.500767][ T7797] __do_page_fault+0x5ef/0xda0 [ 1189.505631][ T7797] do_page_fault+0x71/0x581 [ 1189.510143][ T7797] ? page_fault+0x8/0x30 [ 1189.514391][ T7797] page_fault+0x1e/0x30 [ 1189.518541][ T7797] RIP: 0033:0x42ff3a [ 1189.522444][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1189.542075][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1189.548265][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1189.556272][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1189.564262][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1189.572351][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1189.580606][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1189.911082][ T7797] memory: usage 20660kB, limit 0kB, failcnt 347 [ 1189.917429][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1189.941082][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1189.948000][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:15780KB rss_huge:14336KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:15752KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1189.991077][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24442,uid=0 [ 1190.031124][ T7797] Memory cgroup out of memory: Killed process 24442 (syz-executor.0) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 1190.090861][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1190.112234][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1190.120193][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1190.130317][ T7797] Call Trace: [ 1190.133644][ T7797] dump_stack+0x172/0x1f0 [ 1190.137988][ T7797] dump_header+0x10f/0xb6c [ 1190.142438][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1190.148254][ T7797] ? ___ratelimit+0x60/0x595 [ 1190.152856][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1190.158000][ T7797] oom_kill_process.cold+0x10/0x15 [ 1190.163132][ T7797] out_of_memory+0x79a/0x1280 [ 1190.167834][ T7797] ? lock_downgrade+0x880/0x880 [ 1190.172734][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1190.179018][ T7797] ? oom_killer_disable+0x280/0x280 [ 1190.184246][ T7797] ? find_held_lock+0x35/0x130 [ 1190.189024][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1190.194744][ T7797] ? memcg_event_wake+0x230/0x230 [ 1190.199882][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1190.205029][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1190.209918][ T7797] try_charge+0x102c/0x15c0 [ 1190.214513][ T7797] ? find_held_lock+0x35/0x130 [ 1190.219281][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1190.224851][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1190.231131][ T7797] ? kasan_check_read+0x11/0x20 [ 1190.236012][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1190.241574][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1190.246869][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1190.252511][ T7797] wp_page_copy+0x408/0x1740 [ 1190.257099][ T7797] ? find_held_lock+0x35/0x130 [ 1190.261872][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1190.266157][ T7797] ? lock_downgrade+0x880/0x880 [ 1190.271057][ T7797] ? swp_swapcount+0x540/0x540 [ 1190.275831][ T7797] ? kasan_check_read+0x11/0x20 [ 1190.280691][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1190.285817][ T7797] do_wp_page+0x48e/0x1500 [ 1190.290251][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1190.295636][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1190.300945][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1190.306493][ T7797] ? find_held_lock+0x35/0x130 [ 1190.311274][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1190.316235][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1190.322490][ T7797] ? kasan_check_read+0x11/0x20 [ 1190.327355][ T7797] handle_mm_fault+0x43f/0xb30 [ 1190.332128][ T7797] __do_page_fault+0x5ef/0xda0 [ 1190.336899][ T7797] do_page_fault+0x71/0x581 [ 1190.341491][ T7797] ? page_fault+0x8/0x30 [ 1190.345740][ T7797] page_fault+0x1e/0x30 [ 1190.349891][ T7797] RIP: 0033:0x42ff3a [ 1190.353789][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1190.373393][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1190.379458][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1190.387435][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1190.395407][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1190.403379][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1190.411375][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1190.461132][ T7797] memory: usage 18336kB, limit 0kB, failcnt 353 [ 1190.467427][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1190.515793][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1190.523688][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:13600KB rss_huge:12288KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:13580KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1190.566741][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24457,uid=0 [ 1190.588238][ T7797] Memory cgroup out of memory: Killed process 24457 (syz-executor.0) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 1190.646916][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1190.666630][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1190.674557][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1190.688270][ T7797] Call Trace: [ 1190.691835][ T7797] dump_stack+0x172/0x1f0 [ 1190.696176][ T7797] dump_header+0x10f/0xb6c [ 1190.700615][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1190.706423][ T7797] ? ___ratelimit+0x60/0x595 [ 1190.711014][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1190.716131][ T7797] oom_kill_process.cold+0x10/0x15 [ 1190.721249][ T7797] out_of_memory+0x79a/0x1280 [ 1190.725929][ T7797] ? lock_downgrade+0x880/0x880 [ 1190.731328][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1190.737570][ T7797] ? oom_killer_disable+0x280/0x280 [ 1190.742787][ T7797] ? find_held_lock+0x35/0x130 [ 1190.747564][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1190.753115][ T7797] ? memcg_event_wake+0x230/0x230 [ 1190.758147][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1190.763259][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1190.768112][ T7797] try_charge+0x102c/0x15c0 [ 1190.772618][ T7797] ? find_held_lock+0x35/0x130 [ 1190.777475][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1190.783030][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1190.789292][ T7797] ? kasan_check_read+0x11/0x20 [ 1190.794777][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1190.800333][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1190.805672][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1190.811318][ T7797] wp_page_copy+0x408/0x1740 [ 1190.816974][ T7797] ? find_held_lock+0x35/0x130 [ 1190.821752][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1190.826008][ T7797] ? lock_downgrade+0x880/0x880 [ 1190.830868][ T7797] ? swp_swapcount+0x540/0x540 [ 1190.835643][ T7797] ? kasan_check_read+0x11/0x20 [ 1190.840511][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1190.845643][ T7797] do_wp_page+0x48e/0x1500 [ 1190.850081][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1190.855465][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1190.860935][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1190.866484][ T7797] ? find_held_lock+0x35/0x130 [ 1190.871274][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1190.876236][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1190.882482][ T7797] ? kasan_check_read+0x11/0x20 [ 1190.887347][ T7797] handle_mm_fault+0x43f/0xb30 [ 1190.892115][ T7797] __do_page_fault+0x5ef/0xda0 [ 1190.896888][ T7797] do_page_fault+0x71/0x581 [ 1190.901391][ T7797] ? page_fault+0x8/0x30 [ 1190.905646][ T7797] page_fault+0x1e/0x30 [ 1190.909817][ T7797] RIP: 0033:0x42ff3a [ 1190.913714][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1190.933593][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1190.939659][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1190.947638][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1190.955620][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1190.963771][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1190.971750][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1191.331087][ T7797] memory: usage 16012kB, limit 0kB, failcnt 359 [ 1191.337387][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1191.368958][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1191.391073][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:11440KB rss_huge:10240KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:11420KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1191.456545][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24468,uid=0 [ 1191.497005][ T7797] Memory cgroup out of memory: Killed process 24468 (syz-executor.0) total-vm:72580kB, anon-rss:2216kB, file-rss:34816kB, shmem-rss:0kB [ 1191.537877][ T1043] oom_reaper: reaped process 24468 (syz-executor.0), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1191.577253][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1191.601075][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1191.608997][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.619052][ T7797] Call Trace: [ 1191.622349][ T7797] dump_stack+0x172/0x1f0 [ 1191.626693][ T7797] dump_header+0x10f/0xb6c [ 1191.631114][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1191.636924][ T7797] ? ___ratelimit+0x60/0x595 [ 1191.641519][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1191.646641][ T7797] oom_kill_process.cold+0x10/0x15 [ 1191.651786][ T7797] out_of_memory+0x79a/0x1280 [ 1191.656465][ T7797] ? lock_downgrade+0x880/0x880 [ 1191.661315][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1191.667565][ T7797] ? oom_killer_disable+0x280/0x280 [ 1191.672766][ T7797] ? find_held_lock+0x35/0x130 [ 1191.677542][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1191.683108][ T7797] ? memcg_event_wake+0x230/0x230 [ 1191.688223][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1191.693463][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1191.698585][ T7797] try_charge+0x102c/0x15c0 [ 1191.703096][ T7797] ? find_held_lock+0x35/0x130 [ 1191.707875][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1191.713426][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1191.719685][ T7797] ? kasan_check_read+0x11/0x20 [ 1191.724578][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1191.730131][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1191.735425][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1191.741058][ T7797] wp_page_copy+0x408/0x1740 [ 1191.745649][ T7797] ? find_held_lock+0x35/0x130 [ 1191.750427][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1191.754681][ T7797] ? lock_downgrade+0x880/0x880 [ 1191.759542][ T7797] ? swp_swapcount+0x540/0x540 [ 1191.764314][ T7797] ? kasan_check_read+0x11/0x20 [ 1191.769170][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1191.774293][ T7797] do_wp_page+0x48e/0x1500 [ 1191.778716][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1191.784110][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1191.789249][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1191.794850][ T7797] ? find_held_lock+0x35/0x130 [ 1191.799707][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1191.804671][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1191.810925][ T7797] ? kasan_check_read+0x11/0x20 [ 1191.815793][ T7797] handle_mm_fault+0x43f/0xb30 [ 1191.820562][ T7797] __do_page_fault+0x5ef/0xda0 [ 1191.825504][ T7797] do_page_fault+0x71/0x581 [ 1191.830008][ T7797] ? page_fault+0x8/0x30 [ 1191.834342][ T7797] page_fault+0x1e/0x30 [ 1191.838492][ T7797] RIP: 0033:0x42ff3a [ 1191.842392][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1191.862995][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1191.869086][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1191.877060][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1191.885043][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1191.893099][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1191.901077][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1192.181084][ T7797] memory: usage 13508kB, limit 0kB, failcnt 377 [ 1192.187567][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1192.211097][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1192.217987][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:9252KB rss_huge:8192KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:9220KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1192.271095][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=1485,uid=0 [ 1192.311144][ T7797] Memory cgroup out of memory: Killed process 1485 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 1192.374148][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1192.391175][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1192.399096][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1192.409272][ T7797] Call Trace: [ 1192.412600][ T7797] dump_stack+0x172/0x1f0 [ 1192.417052][ T7797] dump_header+0x10f/0xb6c [ 1192.421483][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1192.427388][ T7797] ? ___ratelimit+0x60/0x595 [ 1192.431981][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1192.437096][ T7797] oom_kill_process.cold+0x10/0x15 [ 1192.442211][ T7797] out_of_memory+0x79a/0x1280 [ 1192.446889][ T7797] ? lock_downgrade+0x880/0x880 [ 1192.451912][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1192.458156][ T7797] ? oom_killer_disable+0x280/0x280 [ 1192.463354][ T7797] ? find_held_lock+0x35/0x130 [ 1192.468130][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1192.473693][ T7797] ? memcg_event_wake+0x230/0x230 [ 1192.478917][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1192.484033][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1192.488893][ T7797] try_charge+0x102c/0x15c0 [ 1192.493569][ T7797] ? find_held_lock+0x35/0x130 [ 1192.498339][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1192.503898][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1192.510144][ T7797] ? kasan_check_read+0x11/0x20 [ 1192.515004][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1192.520557][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1192.525858][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1192.531498][ T7797] wp_page_copy+0x408/0x1740 [ 1192.536091][ T7797] ? find_held_lock+0x35/0x130 [ 1192.540950][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1192.545204][ T7797] ? lock_downgrade+0x880/0x880 [ 1192.550152][ T7797] ? swp_swapcount+0x540/0x540 [ 1192.554924][ T7797] ? kasan_check_read+0x11/0x20 [ 1192.559813][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1192.564948][ T7797] do_wp_page+0x48e/0x1500 [ 1192.569403][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1192.574820][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1192.579958][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1192.585508][ T7797] ? find_held_lock+0x35/0x130 [ 1192.590277][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1192.595225][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1192.601507][ T7797] ? kasan_check_read+0x11/0x20 [ 1192.606470][ T7797] handle_mm_fault+0x43f/0xb30 [ 1192.611249][ T7797] __do_page_fault+0x5ef/0xda0 [ 1192.616110][ T7797] do_page_fault+0x71/0x581 [ 1192.620636][ T7797] ? page_fault+0x8/0x30 [ 1192.624894][ T7797] page_fault+0x1e/0x30 [ 1192.629056][ T7797] RIP: 0033:0x42ff3a [ 1192.632973][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1192.652604][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1192.658680][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1192.666678][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1192.674684][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1192.682992][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1192.690991][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1193.141088][ T7797] memory: usage 11192kB, limit 0kB, failcnt 383 [ 1193.147381][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1193.181096][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1193.187990][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:7084KB rss_huge:6144KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:7056KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1193.241084][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=1512,uid=0 [ 1193.281143][ T7797] Memory cgroup out of memory: Killed process 1512 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 1193.312285][ T1043] oom_reaper: reaped process 1512 (syz-executor.0), now anon-rss:0kB, file-rss:34816kB, shmem-rss:0kB [ 1193.342563][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1193.387360][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1193.395299][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1193.405442][ T7797] Call Trace: [ 1193.408738][ T7797] dump_stack+0x172/0x1f0 [ 1193.413072][ T7797] dump_header+0x10f/0xb6c [ 1193.417493][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1193.423301][ T7797] ? ___ratelimit+0x60/0x595 [ 1193.428186][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1193.433308][ T7797] oom_kill_process.cold+0x10/0x15 [ 1193.438508][ T7797] out_of_memory+0x79a/0x1280 [ 1193.443661][ T7797] ? lock_downgrade+0x880/0x880 [ 1193.448523][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1193.454797][ T7797] ? oom_killer_disable+0x280/0x280 [ 1193.459996][ T7797] ? find_held_lock+0x35/0x130 [ 1193.464779][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1193.470323][ T7797] ? memcg_event_wake+0x230/0x230 [ 1193.475369][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1193.480569][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1193.485510][ T7797] try_charge+0x102c/0x15c0 [ 1193.490015][ T7797] ? find_held_lock+0x35/0x130 [ 1193.494790][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1193.500365][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1193.506613][ T7797] ? kasan_check_read+0x11/0x20 [ 1193.511471][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1193.517024][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1193.522316][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1193.527956][ T7797] wp_page_copy+0x408/0x1740 [ 1193.532638][ T7797] ? find_held_lock+0x35/0x130 [ 1193.537444][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1193.541702][ T7797] ? lock_downgrade+0x880/0x880 [ 1193.546557][ T7797] ? swp_swapcount+0x540/0x540 [ 1193.551343][ T7797] ? kasan_check_read+0x11/0x20 [ 1193.556196][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1193.561318][ T7797] do_wp_page+0x48e/0x1500 [ 1193.565741][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1193.571131][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1193.576522][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1193.582072][ T7797] ? find_held_lock+0x35/0x130 [ 1193.586844][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1193.591974][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1193.598230][ T7797] ? kasan_check_read+0x11/0x20 [ 1193.603090][ T7797] handle_mm_fault+0x43f/0xb30 [ 1193.607864][ T7797] __do_page_fault+0x5ef/0xda0 [ 1193.612637][ T7797] do_page_fault+0x71/0x581 [ 1193.617150][ T7797] ? page_fault+0x8/0x30 [ 1193.621405][ T7797] page_fault+0x1e/0x30 [ 1193.625559][ T7797] RIP: 0033:0x42ff3a [ 1193.629456][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1193.649064][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1193.655134][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1193.663120][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1193.671253][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1193.679227][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1193.690265][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1193.961103][ T7797] memory: usage 8832kB, limit 0kB, failcnt 401 [ 1193.967310][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1194.001076][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1194.007961][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:4900KB rss_huge:4096KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:4888KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1194.075985][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=1591,uid=0 [ 1194.117120][ T7797] Memory cgroup out of memory: Killed process 1591 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 1194.210565][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1194.246801][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1194.254731][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.264782][ T7797] Call Trace: [ 1194.268079][ T7797] dump_stack+0x172/0x1f0 [ 1194.272417][ T7797] dump_header+0x10f/0xb6c [ 1194.276834][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1194.282909][ T7797] ? ___ratelimit+0x60/0x595 [ 1194.287499][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1194.292614][ T7797] oom_kill_process.cold+0x10/0x15 [ 1194.297736][ T7797] out_of_memory+0x79a/0x1280 [ 1194.302421][ T7797] ? lock_downgrade+0x880/0x880 [ 1194.307276][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.313605][ T7797] ? oom_killer_disable+0x280/0x280 [ 1194.318805][ T7797] ? find_held_lock+0x35/0x130 [ 1194.323580][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1194.329126][ T7797] ? memcg_event_wake+0x230/0x230 [ 1194.334160][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1194.339275][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1194.344134][ T7797] try_charge+0x102c/0x15c0 [ 1194.348638][ T7797] ? find_held_lock+0x35/0x130 [ 1194.353421][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1194.358977][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.365227][ T7797] ? kasan_check_read+0x11/0x20 [ 1194.370085][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1194.375639][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1194.381027][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1194.386675][ T7797] wp_page_copy+0x408/0x1740 [ 1194.391277][ T7797] ? find_held_lock+0x35/0x130 [ 1194.396052][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1194.400577][ T7797] ? lock_downgrade+0x880/0x880 [ 1194.405427][ T7797] ? swp_swapcount+0x540/0x540 [ 1194.410195][ T7797] ? kasan_check_read+0x11/0x20 [ 1194.415054][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1194.420175][ T7797] do_wp_page+0x48e/0x1500 [ 1194.424704][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1194.430090][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1194.435213][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1194.440775][ T7797] ? find_held_lock+0x35/0x130 [ 1194.445552][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1194.450507][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.456853][ T7797] ? kasan_check_read+0x11/0x20 [ 1194.461718][ T7797] handle_mm_fault+0x43f/0xb30 [ 1194.466521][ T7797] __do_page_fault+0x5ef/0xda0 [ 1194.471298][ T7797] do_page_fault+0x71/0x581 [ 1194.475801][ T7797] ? page_fault+0x8/0x30 [ 1194.480044][ T7797] page_fault+0x1e/0x30 [ 1194.484194][ T7797] RIP: 0033:0x42ff3a [ 1194.488087][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1194.507707][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1194.513779][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1194.521754][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1194.529753][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1194.537752][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1194.545736][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1194.611131][ T7797] memory: usage 6516kB, limit 0kB, failcnt 407 [ 1194.617342][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1194.641067][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1194.647955][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:2736KB rss_huge:2048KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:2724KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1194.721080][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=1626,uid=0 [ 1194.751114][ T7797] Memory cgroup out of memory: Killed process 1626 (syz-executor.0) total-vm:72448kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB [ 1194.782223][ T1043] oom_reaper: reaped process 1626 (syz-executor.0), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 1194.881308][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1194.911074][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1194.918994][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1194.929046][ T7797] Call Trace: [ 1194.932344][ T7797] dump_stack+0x172/0x1f0 [ 1194.936689][ T7797] dump_header+0x10f/0xb6c [ 1194.941112][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1194.946919][ T7797] ? ___ratelimit+0x60/0x595 [ 1194.951525][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1194.956644][ T7797] oom_kill_process.cold+0x10/0x15 [ 1194.961765][ T7797] out_of_memory+0x79a/0x1280 [ 1194.966448][ T7797] ? lock_downgrade+0x880/0x880 [ 1194.971298][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1194.977545][ T7797] ? oom_killer_disable+0x280/0x280 [ 1194.982742][ T7797] ? find_held_lock+0x35/0x130 [ 1194.987516][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1194.993060][ T7797] ? memcg_event_wake+0x230/0x230 [ 1194.998523][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1195.003639][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1195.008508][ T7797] try_charge+0x102c/0x15c0 [ 1195.013014][ T7797] ? find_held_lock+0x35/0x130 [ 1195.017789][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1195.023340][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.029583][ T7797] ? kasan_check_read+0x11/0x20 [ 1195.034437][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1195.039992][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1195.045283][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1195.050919][ T7797] wp_page_copy+0x408/0x1740 [ 1195.055522][ T7797] ? find_held_lock+0x35/0x130 [ 1195.060290][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1195.064537][ T7797] ? lock_downgrade+0x880/0x880 [ 1195.069386][ T7797] ? swp_swapcount+0x540/0x540 [ 1195.074159][ T7797] ? kasan_check_read+0x11/0x20 [ 1195.079016][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1195.084133][ T7797] do_wp_page+0x48e/0x1500 [ 1195.088557][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1195.093945][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1195.099067][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1195.104613][ T7797] ? find_held_lock+0x35/0x130 [ 1195.109378][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1195.114327][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1195.120574][ T7797] ? kasan_check_read+0x11/0x20 [ 1195.125429][ T7797] handle_mm_fault+0x43f/0xb30 [ 1195.130219][ T7797] __do_page_fault+0x5ef/0xda0 [ 1195.135000][ T7797] do_page_fault+0x71/0x581 [ 1195.139507][ T7797] ? page_fault+0x8/0x30 [ 1195.143761][ T7797] page_fault+0x1e/0x30 [ 1195.147913][ T7797] RIP: 0033:0x42ff3a [ 1195.151809][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1195.171426][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1195.177498][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1195.185475][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1195.193448][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1195.201417][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1195.209396][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1195.742067][ T7797] memory: usage 4192kB, limit 0kB, failcnt 431 [ 1195.748274][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1195.784170][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1195.804175][ T7797] Memory cgroup stats for /syz0: cache:260KB rss:564KB rss_huge:0KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:16KB active_anon:552KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1195.866718][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=31333,uid=0 [ 1195.926928][ T7797] Memory cgroup out of memory: Killed process 31333 (syz-executor.0) total-vm:72448kB, anon-rss:160kB, file-rss:35800kB, shmem-rss:4kB [ 1196.009198][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1196.020092][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1196.027984][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.038033][ T7797] Call Trace: [ 1196.041330][ T7797] dump_stack+0x172/0x1f0 [ 1196.045681][ T7797] dump_header+0x10f/0xb6c [ 1196.050107][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1196.055944][ T7797] ? ___ratelimit+0x60/0x595 [ 1196.060534][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1196.065657][ T7797] oom_kill_process.cold+0x10/0x15 [ 1196.070791][ T7797] out_of_memory+0x79a/0x1280 [ 1196.075476][ T7797] ? lock_downgrade+0x880/0x880 [ 1196.080353][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.086603][ T7797] ? oom_killer_disable+0x280/0x280 [ 1196.091825][ T7797] ? find_held_lock+0x35/0x130 [ 1196.096603][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1196.102148][ T7797] ? memcg_event_wake+0x230/0x230 [ 1196.107179][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1196.112407][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1196.117263][ T7797] try_charge+0x102c/0x15c0 [ 1196.121765][ T7797] ? find_held_lock+0x35/0x130 [ 1196.126538][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1196.132095][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.138353][ T7797] ? kasan_check_read+0x11/0x20 [ 1196.143211][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1196.148815][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1196.154118][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1196.159769][ T7797] wp_page_copy+0x408/0x1740 [ 1196.164371][ T7797] ? find_held_lock+0x35/0x130 [ 1196.169233][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1196.173490][ T7797] ? lock_downgrade+0x880/0x880 [ 1196.178366][ T7797] ? swp_swapcount+0x540/0x540 [ 1196.183140][ T7797] ? kasan_check_read+0x11/0x20 [ 1196.188001][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1196.193206][ T7797] do_wp_page+0x48e/0x1500 [ 1196.197636][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1196.203292][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1196.208418][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1196.213968][ T7797] ? find_held_lock+0x35/0x130 [ 1196.218737][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1196.223713][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.229973][ T7797] ? kasan_check_read+0x11/0x20 [ 1196.234860][ T7797] handle_mm_fault+0x43f/0xb30 [ 1196.239647][ T7797] __do_page_fault+0x5ef/0xda0 [ 1196.244455][ T7797] do_page_fault+0x71/0x581 [ 1196.248962][ T7797] ? page_fault+0x8/0x30 [ 1196.253220][ T7797] page_fault+0x1e/0x30 [ 1196.257375][ T7797] RIP: 0033:0x42ff3a [ 1196.261277][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1196.280884][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1196.286951][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1196.294923][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1196.302894][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1196.310866][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1196.318843][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1196.392651][ T7797] memory: usage 3796kB, limit 0kB, failcnt 437 [ 1196.398861][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1196.431112][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1196.438004][ T7797] Memory cgroup stats for /syz0: cache:128KB rss:564KB rss_huge:0KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:12KB active_anon:452KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1196.511080][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=31347,uid=0 [ 1196.541135][ T7797] Memory cgroup out of memory: Killed process 31347 (syz-executor.0) total-vm:72448kB, anon-rss:160kB, file-rss:35800kB, shmem-rss:4kB [ 1196.617644][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1196.641136][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1196.649597][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.659655][ T7797] Call Trace: [ 1196.662973][ T7797] dump_stack+0x172/0x1f0 [ 1196.667306][ T7797] dump_header+0x10f/0xb6c [ 1196.671724][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1196.677537][ T7797] ? ___ratelimit+0x60/0x595 [ 1196.682143][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1196.687258][ T7797] oom_kill_process.cold+0x10/0x15 [ 1196.692371][ T7797] out_of_memory+0x79a/0x1280 [ 1196.697053][ T7797] ? lock_downgrade+0x880/0x880 [ 1196.701908][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.708153][ T7797] ? oom_killer_disable+0x280/0x280 [ 1196.713352][ T7797] ? find_held_lock+0x35/0x130 [ 1196.718135][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1196.723691][ T7797] ? memcg_event_wake+0x230/0x230 [ 1196.729276][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1196.734375][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1196.739234][ T7797] try_charge+0x102c/0x15c0 [ 1196.743739][ T7797] ? find_held_lock+0x35/0x130 [ 1196.748513][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1196.754061][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.760308][ T7797] ? kasan_check_read+0x11/0x20 [ 1196.765263][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1196.770815][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1196.776110][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1196.781751][ T7797] wp_page_copy+0x408/0x1740 [ 1196.786348][ T7797] ? find_held_lock+0x35/0x130 [ 1196.791121][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1196.795369][ T7797] ? lock_downgrade+0x880/0x880 [ 1196.800334][ T7797] ? swp_swapcount+0x540/0x540 [ 1196.805211][ T7797] ? kasan_check_read+0x11/0x20 [ 1196.810082][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1196.815204][ T7797] do_wp_page+0x48e/0x1500 [ 1196.819632][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1196.825031][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1196.830151][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1196.835703][ T7797] ? find_held_lock+0x35/0x130 [ 1196.840471][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1196.845422][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1196.851745][ T7797] ? kasan_check_read+0x11/0x20 [ 1196.856603][ T7797] handle_mm_fault+0x43f/0xb30 [ 1196.861372][ T7797] __do_page_fault+0x5ef/0xda0 [ 1196.866141][ T7797] do_page_fault+0x71/0x581 [ 1196.870650][ T7797] ? page_fault+0x8/0x30 [ 1196.874901][ T7797] page_fault+0x1e/0x30 [ 1196.879050][ T7797] RIP: 0033:0x42ff3a [ 1196.882941][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1196.902542][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1196.908613][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1196.916586][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1196.924559][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1196.932627][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1196.940608][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1197.261089][ T7797] memory: usage 3516kB, limit 0kB, failcnt 443 [ 1197.267390][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1197.291065][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1197.297948][ T7797] Memory cgroup stats for /syz0: cache:128KB rss:564KB rss_huge:0KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:8KB active_anon:352KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1197.341077][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=31352,uid=0 [ 1197.371153][ T7797] Memory cgroup out of memory: Killed process 31352 (syz-executor.0) total-vm:72448kB, anon-rss:160kB, file-rss:35800kB, shmem-rss:4kB [ 1197.433582][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1197.461179][ T7797] CPU: 1 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1197.469280][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1197.479521][ T7797] Call Trace: [ 1197.482827][ T7797] dump_stack+0x172/0x1f0 [ 1197.487183][ T7797] dump_header+0x10f/0xb6c [ 1197.491618][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1197.497446][ T7797] ? ___ratelimit+0x60/0x595 [ 1197.502059][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1197.507182][ T7797] oom_kill_process.cold+0x10/0x15 [ 1197.512302][ T7797] out_of_memory+0x79a/0x1280 [ 1197.516989][ T7797] ? lock_downgrade+0x880/0x880 [ 1197.521843][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1197.528089][ T7797] ? oom_killer_disable+0x280/0x280 [ 1197.533483][ T7797] ? find_held_lock+0x35/0x130 [ 1197.538267][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1197.543829][ T7797] ? memcg_event_wake+0x230/0x230 [ 1197.548872][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1197.554077][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1197.558938][ T7797] try_charge+0x102c/0x15c0 [ 1197.563446][ T7797] ? find_held_lock+0x35/0x130 [ 1197.568223][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1197.573782][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1197.580026][ T7797] ? kasan_check_read+0x11/0x20 [ 1197.584880][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1197.590430][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1197.595727][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1197.601373][ T7797] wp_page_copy+0x408/0x1740 [ 1197.605985][ T7797] ? find_held_lock+0x35/0x130 [ 1197.610762][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1197.615007][ T7797] ? lock_downgrade+0x880/0x880 [ 1197.619857][ T7797] ? swp_swapcount+0x540/0x540 [ 1197.624628][ T7797] ? kasan_check_read+0x11/0x20 [ 1197.629486][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1197.634624][ T7797] do_wp_page+0x48e/0x1500 [ 1197.639047][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1197.644428][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1197.649549][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1197.655099][ T7797] ? find_held_lock+0x35/0x130 [ 1197.659868][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1197.664845][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1197.671092][ T7797] ? kasan_check_read+0x11/0x20 [ 1197.675953][ T7797] handle_mm_fault+0x43f/0xb30 [ 1197.680721][ T7797] __do_page_fault+0x5ef/0xda0 [ 1197.685504][ T7797] do_page_fault+0x71/0x581 [ 1197.690007][ T7797] ? page_fault+0x8/0x30 [ 1197.694253][ T7797] page_fault+0x1e/0x30 [ 1197.698405][ T7797] RIP: 0033:0x42ff3a [ 1197.702402][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1197.722018][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1197.728111][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1197.736103][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1197.744077][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1197.752060][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1197.760035][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1198.031987][ T7797] memory: usage 3232kB, limit 0kB, failcnt 449 [ 1198.038208][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1198.051432][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1198.058312][ T7797] Memory cgroup stats for /syz0: cache:128KB rss:428KB rss_huge:0KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:4KB active_anon:252KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1198.125753][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=31323,uid=0 [ 1198.169038][ T7797] Memory cgroup out of memory: Killed process 31323 (syz-executor.0) total-vm:72580kB, anon-rss:168kB, file-rss:35788kB, shmem-rss:0kB [ 1198.269224][ T7797] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1198.279295][ T7797] CPU: 0 PID: 7797 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1198.287191][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1198.297247][ T7797] Call Trace: [ 1198.300542][ T7797] dump_stack+0x172/0x1f0 [ 1198.304883][ T7797] dump_header+0x10f/0xb6c [ 1198.309305][ T7797] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1198.315160][ T7797] ? ___ratelimit+0x60/0x595 [ 1198.319761][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1198.324883][ T7797] oom_kill_process.cold+0x10/0x15 [ 1198.329998][ T7797] out_of_memory+0x79a/0x1280 [ 1198.334703][ T7797] ? lock_downgrade+0x880/0x880 [ 1198.339554][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1198.345816][ T7797] ? oom_killer_disable+0x280/0x280 [ 1198.351024][ T7797] ? find_held_lock+0x35/0x130 [ 1198.355875][ T7797] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1198.361429][ T7797] ? memcg_event_wake+0x230/0x230 [ 1198.366466][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1198.371843][ T7797] ? _raw_spin_unlock+0x2d/0x50 [ 1198.376718][ T7797] try_charge+0x102c/0x15c0 [ 1198.381228][ T7797] ? find_held_lock+0x35/0x130 [ 1198.386026][ T7797] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1198.391580][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1198.397829][ T7797] ? kasan_check_read+0x11/0x20 [ 1198.402704][ T7797] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1198.408260][ T7797] mem_cgroup_try_charge+0x24d/0x5e0 [ 1198.413555][ T7797] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1198.419202][ T7797] wp_page_copy+0x408/0x1740 [ 1198.423825][ T7797] ? find_held_lock+0x35/0x130 [ 1198.428625][ T7797] ? pmd_pfn+0x1d0/0x1d0 [ 1198.433087][ T7797] ? lock_downgrade+0x880/0x880 [ 1198.437969][ T7797] ? swp_swapcount+0x540/0x540 [ 1198.442773][ T7797] ? kasan_check_read+0x11/0x20 [ 1198.447652][ T7797] ? do_raw_spin_unlock+0x57/0x270 [ 1198.452802][ T7797] do_wp_page+0x48e/0x1500 [ 1198.457241][ T7797] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1198.462695][ T7797] __handle_mm_fault+0x22e8/0x3ec0 [ 1198.467837][ T7797] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1198.473403][ T7797] ? find_held_lock+0x35/0x130 [ 1198.478543][ T7797] ? handle_mm_fault+0x322/0xb30 [ 1198.483522][ T7797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1198.489787][ T7797] ? kasan_check_read+0x11/0x20 [ 1198.494648][ T7797] handle_mm_fault+0x43f/0xb30 [ 1198.499429][ T7797] __do_page_fault+0x5ef/0xda0 [ 1198.504213][ T7797] do_page_fault+0x71/0x581 [ 1198.508726][ T7797] ? page_fault+0x8/0x30 [ 1198.512973][ T7797] page_fault+0x1e/0x30 [ 1198.517330][ T7797] RIP: 0033:0x42ff3a [ 1198.521228][ T7797] Code: 48 29 e8 31 c9 48 81 fb 40 36 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 48 89 4a 08 <48> 89 46 08 48 8d 4a 10 8b 05 2c 50 62 00 85 c0 0f 84 3a f7 ff ff [ 1198.540860][ T7797] RSP: 002b:00007fff74838f40 EFLAGS: 00010206 [ 1198.546937][ T7797] RAX: 0000000000018691 RBX: 0000000000713640 RCX: 0000000000008041 [ 1198.554919][ T7797] RDX: 0000000002911930 RSI: 0000000002919970 RDI: 0000000000000003 [ 1198.562899][ T7797] RBP: 0000000000008041 R08: 0000000000000001 R09: 0000000002910940 [ 1198.570886][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000713698 [ 1198.578964][ T7797] R13: 0000000000713698 R14: 000000000011ba5a R15: 0000000000002710 [ 1198.681134][ T7797] memory: usage 2884kB, limit 0kB, failcnt 455 [ 1198.687541][ T7797] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1198.711082][ T7797] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1198.717997][ T7797] Memory cgroup stats for /syz0: cache:128KB rss:276KB rss_huge:0KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:4KB active_anon:108KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1198.791150][ T7797] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=7797,uid=0 [ 1198.821130][ T7797] Memory cgroup out of memory: Killed process 7797 (syz-executor.0) total-vm:72316kB, anon-rss:116kB, file-rss:35712kB, shmem-rss:0kB [ 1198.861810][ T1043] oom_reaper: reaped process 7797 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 00:56:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:56:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:56:22 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000000)={0x1, 0x2, @start}) 00:56:22 executing program 1: write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x122) fstat(0xffffffffffffffff, &(0x7f0000000340)) 00:56:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 00:56:22 executing program 2: ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'veth0_to_hsr\x00', {0x2, 0x0, @multicast2}}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x00\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\xf9\xce\x01'}) [ 1199.590377][ T2992] sg_write: data in/out 262577/248 bytes for SCSI command 0x0-- guessing data in; [ 1199.590377][ T2992] program syz-executor.1 not setting count and/or reply_len properly 00:56:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:56:22 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000000)={0x1, 0x2, @start}) 00:56:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:56:23 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:56:23 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 1200.231539][ T3009] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 00:56:23 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 1200.313019][ T3009] CPU: 1 PID: 3009 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #92 [ 1200.320976][ T3009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.331086][ T3009] Call Trace: [ 1200.334580][ T3009] dump_stack+0x172/0x1f0 [ 1200.338950][ T3009] dump_header+0x10f/0xb6c [ 1200.343570][ T3009] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1200.349587][ T3009] ? ___ratelimit+0x60/0x595 [ 1200.354475][ T3009] ? do_raw_spin_unlock+0x57/0x270 [ 1200.359610][ T3009] oom_kill_process.cold+0x10/0x15 [ 1200.364752][ T3009] out_of_memory+0x79a/0x1280 [ 1200.369486][ T3009] ? cgroup_file_notify+0x140/0x1b0 [ 1200.374849][ T3009] ? oom_killer_disable+0x280/0x280 [ 1200.380420][ T3009] ? cgroup_file_notify+0x140/0x1b0 [ 1200.385643][ T3009] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1200.391421][ T3009] ? memcg_event_wake+0x230/0x230 [ 1200.397291][ T3009] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1200.403488][ T3009] ? cgroup_file_notify+0x140/0x1b0 [ 1200.409060][ T3009] memory_max_write+0x169/0x300 [ 1200.414709][ T3009] ? kernfs_fop_write+0x204/0x480 [ 1200.420275][ T3009] ? mem_cgroup_write+0x360/0x360 [ 1200.425479][ T3009] ? lock_acquire+0x16f/0x3f0 [ 1200.430506][ T3009] ? kernfs_fop_write+0x227/0x480 [ 1200.437004][ T3009] cgroup_file_write+0x245/0x7a0 [ 1200.443967][ T3009] ? mem_cgroup_write+0x360/0x360 [ 1200.449741][ T3009] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1200.455954][ T3009] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1200.462500][ T3009] kernfs_fop_write+0x2ba/0x480 [ 1200.467382][ T3009] __vfs_write+0x8d/0x110 [ 1200.471825][ T3009] ? kernfs_fop_open+0xd90/0xd90 [ 1200.476967][ T3009] vfs_write+0x20c/0x580 [ 1200.481614][ T3009] ksys_write+0x14f/0x2d0 [ 1200.487045][ T3009] ? __ia32_sys_read+0xb0/0xb0 [ 1200.492126][ T3009] ? do_syscall_64+0x26/0x610 [ 1200.497228][ T3009] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.503493][ T3009] ? do_syscall_64+0x26/0x610 [ 1200.508367][ T3009] __x64_sys_write+0x73/0xb0 [ 1200.513416][ T3009] do_syscall_64+0x103/0x610 [ 1200.518413][ T3009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1200.524620][ T3009] RIP: 0033:0x458da9 [ 1200.528889][ T3009] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1200.549258][ T3009] RSP: 002b:00007f35f8510c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1200.558397][ T3009] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 1200.566504][ T3009] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1200.574507][ T3009] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1200.582741][ T3009] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f35f85116d4 [ 1200.591081][ T3009] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 1200.711232][ T3009] memory: usage 203228kB, limit 0kB, failcnt 0 [ 1200.732003][ T3009] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1200.768465][ T3009] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1200.798035][ T3009] Memory cgroup stats for /syz1: cache:136KB rss:196216KB rss_huge:180224KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:108008KB active_anon:49248KB inactive_file:0KB active_file:8KB unevictable:38912KB 00:56:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0xfe80000000000000, @empty}}, 0x0, 0x0, 0x500, 0x0, 0x1000000000054}, 0x98) [ 1200.855555][ T3001] bond0: Error: Device is in use and cannot be enslaved [ 1200.865749][ T3009] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=20134,uid=0 00:56:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 1200.961248][ T3009] Memory cgroup out of memory: Killed process 20134 (syz-executor.1) total-vm:72580kB, anon-rss:18112kB, file-rss:34816kB, shmem-rss:0kB [ 1201.017259][ T1043] oom_reaper: reaped process 20134 (syz-executor.1), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 1201.018294][ T3016] syz-executor.3 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 00:56:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 1201.133869][ T3016] CPU: 1 PID: 3016 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #92 [ 1201.142737][ T3016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1201.152964][ T3016] Call Trace: [ 1201.156864][ T3016] dump_stack+0x172/0x1f0 [ 1201.161346][ T3016] dump_header+0x10f/0xb6c [ 1201.166328][ T3016] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1201.172335][ T3016] ? ___ratelimit+0x60/0x595 [ 1201.177119][ T3016] ? do_raw_spin_unlock+0x57/0x270 [ 1201.182377][ T3016] oom_kill_process.cold+0x10/0x15 [ 1201.187601][ T3016] out_of_memory+0x79a/0x1280 [ 1201.192310][ T3016] ? oom_killer_disable+0x280/0x280 [ 1201.197699][ T3016] ? cgroup_file_notify+0x140/0x1b0 [ 1201.202935][ T3016] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1201.208505][ T3016] ? memcg_event_wake+0x230/0x230 [ 1201.213760][ T3016] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1201.220230][ T3016] ? cgroup_file_notify+0x140/0x1b0 [ 1201.225842][ T3016] memory_max_write+0x169/0x300 [ 1201.230952][ T3016] ? kernfs_fop_write+0x204/0x480 [ 1201.236362][ T3016] ? mem_cgroup_write+0x360/0x360 [ 1201.241761][ T3016] ? lock_acquire+0x16f/0x3f0 [ 1201.246809][ T3016] ? kernfs_fop_write+0x227/0x480 [ 1201.252163][ T3016] cgroup_file_write+0x245/0x7a0 [ 1201.257828][ T3016] ? mem_cgroup_write+0x360/0x360 [ 1201.263052][ T3016] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1201.268911][ T3016] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1201.274934][ T3016] kernfs_fop_write+0x2ba/0x480 [ 1201.280226][ T3016] __vfs_write+0x8d/0x110 [ 1201.285577][ T3016] ? kernfs_fop_open+0xd90/0xd90 [ 1201.290735][ T3016] vfs_write+0x20c/0x580 [ 1201.295110][ T3016] ksys_write+0x14f/0x2d0 [ 1201.299758][ T3016] ? __ia32_sys_read+0xb0/0xb0 [ 1201.305588][ T3016] ? do_syscall_64+0x26/0x610 [ 1201.310894][ T3016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1201.317697][ T3016] ? do_syscall_64+0x26/0x610 [ 1201.323143][ T3016] __x64_sys_write+0x73/0xb0 [ 1201.328376][ T3016] do_syscall_64+0x103/0x610 [ 1201.333737][ T3016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1201.340549][ T3016] RIP: 0033:0x458da9 [ 1201.345096][ T3016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1201.365312][ T3016] RSP: 002b:00007fbaa3099c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1201.374338][ T3016] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 00:56:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$adsp(0x0, 0x1, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x9) add_key$user(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000580), 0x0, 0xfffffffffffffffa) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 1201.382850][ T3016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1201.391734][ T3016] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1201.400384][ T3016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbaa309a6d4 [ 1201.409357][ T3016] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff 00:56:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:56:25 executing program 4: openat$dlm_control(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x2d) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x6) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ptrace$peekuser(0x3, 0x0, 0x0) 00:56:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0xfe80000000000000, @empty}}, 0x0, 0x0, 0x500, 0x0, 0x1000000000054}, 0x98) 00:56:25 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x80, 0x0) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000a40)='/cgroup^#)\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001d80)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001e00)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003440)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000003400)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) getresuid(0x0, &(0x7f0000000840), &(0x7f0000000640)) stat(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) getuid() getgid() getresuid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) r2 = creat(&(0x7f0000000580)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) unlink(&(0x7f0000000940)='./file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xd, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0xe, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0300001562c5d5844d6fa3653b"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) [ 1202.232775][ T3016] memory: usage 123632kB, limit 0kB, failcnt 0 [ 1202.290934][ T3049] IPVS: ftp: loaded support on port[0] = 21 [ 1202.314827][ T3016] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1202.385633][ T3016] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1202.432253][ T3016] Memory cgroup stats for /syz3: cache:68KB rss:116756KB rss_huge:104448KB shmem:60KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:70144KB active_anon:32208KB inactive_file:0KB active_file:20KB unevictable:14336KB [ 1202.493378][ T3016] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=1523,uid=0 [ 1202.550209][ T3016] Memory cgroup out of memory: Killed process 1523 (syz-executor.3) total-vm:72580kB, anon-rss:18112kB, file-rss:34816kB, shmem-rss:0kB [ 1204.214784][ T3049] chnl_net:caif_netlink_parms(): no params data found [ 1204.257934][ T373] device bridge_slave_1 left promiscuous mode [ 1204.290829][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 1204.359079][ T373] device bridge_slave_0 left promiscuous mode [ 1204.370032][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 1213.104281][ T373] device hsr_slave_1 left promiscuous mode [ 1213.238105][ T373] device hsr_slave_0 left promiscuous mode [ 1213.286095][ T373] team0 (unregistering): Port device team_slave_1 removed [ 1213.351851][ T373] team0 (unregistering): Port device team_slave_0 removed [ 1213.491153][ T373] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1213.577977][ T373] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1213.874311][ T373] bond0 (unregistering): Released all slaves [ 1214.190365][ T3049] bridge0: port 1(bridge_slave_0) entered blocking state [ 1214.231374][ T3049] bridge0: port 1(bridge_slave_0) entered disabled state [ 1214.239591][ T3049] device bridge_slave_0 entered promiscuous mode [ 1214.278867][ T3049] bridge0: port 2(bridge_slave_1) entered blocking state [ 1214.301210][ T3049] bridge0: port 2(bridge_slave_1) entered disabled state [ 1214.309172][ T3049] device bridge_slave_1 entered promiscuous mode [ 1214.399953][ T3049] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1214.475958][ T3049] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1214.557296][ T3049] team0: Port device team_slave_0 added [ 1214.580223][ T3049] team0: Port device team_slave_1 added [ 1214.713739][ T3049] device hsr_slave_0 entered promiscuous mode [ 1214.761493][ T3049] device hsr_slave_1 entered promiscuous mode [ 1214.850521][ T3049] bridge0: port 2(bridge_slave_1) entered blocking state [ 1214.857711][ T3049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1214.865650][ T3049] bridge0: port 1(bridge_slave_0) entered blocking state [ 1214.872879][ T3049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1215.055343][ T3049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1215.101004][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1215.181383][ T2989] bridge0: port 1(bridge_slave_0) entered disabled state [ 1215.201272][ T2989] bridge0: port 2(bridge_slave_1) entered disabled state [ 1215.266619][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1215.372612][ T3049] 8021q: adding VLAN 0 to HW filter on device team0 [ 1215.396759][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1215.422041][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1215.430431][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 1215.437550][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1215.513044][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1215.551686][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1215.560258][ T3686] bridge0: port 2(bridge_slave_1) entered blocking state [ 1215.567402][ T3686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1215.621431][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1215.630236][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1215.661926][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1215.670647][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1215.751531][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1215.781806][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1215.790579][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1215.841808][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1215.850502][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1215.891751][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1215.900757][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1215.953625][ T3049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1216.004865][ T3049] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1216.222743][ T3060] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1216.251330][ T3060] CPU: 1 PID: 3060 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1216.259276][ T3060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.269350][ T3060] Call Trace: [ 1216.272655][ T3060] dump_stack+0x172/0x1f0 [ 1216.277011][ T3060] dump_header+0x10f/0xb6c [ 1216.281446][ T3060] ? oom_kill_process+0x94/0x400 [ 1216.286567][ T3060] oom_kill_process.cold+0x10/0x15 [ 1216.291691][ T3060] out_of_memory+0x79a/0x1280 [ 1216.296386][ T3060] ? __sched_text_start+0x8/0x8 [ 1216.301253][ T3060] ? oom_killer_disable+0x280/0x280 [ 1216.308470][ T3060] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1216.314025][ T3060] ? memcg_event_wake+0x230/0x230 [ 1216.319062][ T3060] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1216.324961][ T3060] ? cgroup_file_notify+0x140/0x1b0 [ 1216.330172][ T3060] memory_max_write+0x169/0x300 [ 1216.335033][ T3060] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1216.340504][ T3060] ? mem_cgroup_write+0x360/0x360 [ 1216.345546][ T3060] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1216.351016][ T3060] cgroup_file_write+0x245/0x7a0 [ 1216.355959][ T3060] ? mem_cgroup_write+0x360/0x360 [ 1216.360992][ T3060] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1216.366636][ T3060] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1216.372291][ T3060] kernfs_fop_write+0x2ba/0x480 [ 1216.377326][ T3060] __vfs_write+0x8d/0x110 [ 1216.381661][ T3060] ? kernfs_fop_open+0xd90/0xd90 [ 1216.386616][ T3060] vfs_write+0x20c/0x580 [ 1216.390865][ T3060] ksys_write+0x14f/0x2d0 [ 1216.395199][ T3060] ? __ia32_sys_read+0xb0/0xb0 [ 1216.399981][ T3060] ? do_syscall_64+0x26/0x610 [ 1216.404661][ T3060] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1216.410742][ T3060] ? do_syscall_64+0x26/0x610 [ 1216.415428][ T3060] __x64_sys_write+0x73/0xb0 [ 1216.420028][ T3060] do_syscall_64+0x103/0x610 [ 1216.424626][ T3060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1216.430526][ T3060] RIP: 0033:0x458da9 [ 1216.434426][ T3060] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1216.454365][ T3060] RSP: 002b:00007f695e8afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1216.462885][ T3060] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 1216.470860][ T3060] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1216.478839][ T3060] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1216.486819][ T3060] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f695e8b06d4 [ 1216.494824][ T3060] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 1216.841355][ T3060] memory: usage 3484kB, limit 0kB, failcnt 456 [ 1216.871956][ T3060] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1216.906855][ T3060] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1216.942104][ T3060] Memory cgroup stats for /syz0: cache:128KB rss:2156KB rss_huge:2048KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2156KB inactive_file:4KB active_file:0KB unevictable:0KB [ 1217.011227][ T3060] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=3059,uid=0 [ 1217.061665][ T3060] Memory cgroup out of memory: Killed process 3059 (syz-executor.0) total-vm:72452kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 1217.092707][ T1043] oom_reaper: reaped process 3059 (syz-executor.0), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB 00:56:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:56:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x80, 0x0) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000a40)='/cgroup^#)\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001d80)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001e00)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003440)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000003400)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) getresuid(0x0, &(0x7f0000000840), &(0x7f0000000640)) stat(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) getuid() getgid() getresuid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) r2 = creat(&(0x7f0000000580)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) unlink(&(0x7f0000000940)='./file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xd, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0xe, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0300001562c5d5844d6fa3653b"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 00:56:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$adsp(0x0, 0x1, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x9) add_key$user(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000580), 0x0, 0xfffffffffffffffa) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:56:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0xfe80000000000000, @empty}}, 0x0, 0x0, 0x500, 0x0, 0x1000000000054}, 0x98) 00:56:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) [ 1217.196246][ T3049] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1217.217814][ T3049] CPU: 1 PID: 3049 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1217.225748][ T3049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.235811][ T3049] Call Trace: [ 1217.239122][ T3049] dump_stack+0x172/0x1f0 [ 1217.243465][ T3049] dump_header+0x10f/0xb6c [ 1217.247890][ T3049] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1217.253709][ T3049] ? ___ratelimit+0x60/0x595 [ 1217.258314][ T3049] ? do_raw_spin_unlock+0x57/0x270 [ 1217.263430][ T3049] oom_kill_process.cold+0x10/0x15 [ 1217.268549][ T3049] out_of_memory+0x79a/0x1280 [ 1217.273269][ T3049] ? lock_downgrade+0x880/0x880 [ 1217.278130][ T3049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1217.284383][ T3049] ? oom_killer_disable+0x280/0x280 [ 1217.289590][ T3049] ? find_held_lock+0x35/0x130 [ 1217.294370][ T3049] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1217.299930][ T3049] ? memcg_event_wake+0x230/0x230 [ 1217.304975][ T3049] ? do_raw_spin_unlock+0x57/0x270 [ 1217.310091][ T3049] ? _raw_spin_unlock+0x2d/0x50 [ 1217.314953][ T3049] try_charge+0x102c/0x15c0 [ 1217.319458][ T3049] ? find_held_lock+0x35/0x130 [ 1217.324239][ T3049] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1217.329883][ T3049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1217.336321][ T3049] ? kasan_check_read+0x11/0x20 [ 1217.341460][ T3049] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1217.347111][ T3049] mem_cgroup_try_charge+0x24d/0x5e0 [ 1217.352415][ T3049] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1217.358073][ T3049] wp_page_copy+0x408/0x1740 [ 1217.362843][ T3049] ? find_held_lock+0x35/0x130 [ 1217.367621][ T3049] ? pmd_pfn+0x1d0/0x1d0 [ 1217.371876][ T3049] ? lock_downgrade+0x880/0x880 [ 1217.376730][ T3049] ? swp_swapcount+0x540/0x540 [ 1217.381531][ T3049] ? kasan_check_read+0x11/0x20 [ 1217.386389][ T3049] ? do_raw_spin_unlock+0x57/0x270 [ 1217.391702][ T3049] do_wp_page+0x48e/0x1500 [ 1217.396323][ T3049] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1217.401732][ T3049] __handle_mm_fault+0x22e8/0x3ec0 [ 1217.406875][ T3049] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1217.412716][ T3049] ? find_held_lock+0x35/0x130 [ 1217.417782][ T3049] ? handle_mm_fault+0x322/0xb30 [ 1217.423280][ T3049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1217.429730][ T3049] ? kasan_check_read+0x11/0x20 [ 1217.434820][ T3049] handle_mm_fault+0x43f/0xb30 [ 1217.439696][ T3049] __do_page_fault+0x5ef/0xda0 [ 1217.444489][ T3049] do_page_fault+0x71/0x581 [ 1217.449005][ T3049] ? page_fault+0x8/0x30 [ 1217.453374][ T3049] page_fault+0x1e/0x30 [ 1217.457535][ T3049] RIP: 0033:0x4032a2 [ 1217.462391][ T3049] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 1217.482098][ T3049] RSP: 002b:00007ffda2b9cb40 EFLAGS: 00010246 [ 1217.488176][ T3049] RAX: 0000000000000000 RBX: 0000000000129199 RCX: 0000000000412a80 [ 1217.496301][ T3049] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffda2b9dc70 [ 1217.504281][ T3049] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000000c69940 [ 1217.512263][ T3049] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffda2b9dc70 [ 1217.520247][ T3049] R13: 00007ffda2b9dc60 R14: 0000000000000000 R15: 00007ffda2b9dc70 [ 1217.546989][ T3049] memory: usage 1088kB, limit 0kB, failcnt 468 [ 1217.553534][ T3049] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1217.564761][ T3049] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1217.603789][ T3049] Memory cgroup stats for /syz0: cache:128KB rss:44KB rss_huge:0KB shmem:36KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:4KB unevictable:0KB [ 1217.665146][ T3049] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=3049,uid=0 00:56:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x80, 0x0) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000a40)='/cgroup^#)\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001d80)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001e00)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003440)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000003400)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) getresuid(0x0, &(0x7f0000000840), &(0x7f0000000640)) stat(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) getuid() getgid() getresuid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) r2 = creat(&(0x7f0000000580)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) unlink(&(0x7f0000000940)='./file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xd, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0xe, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0300001562c5d5844d6fa3653b"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) [ 1217.731395][ T3049] Memory cgroup out of memory: Killed process 3049 (syz-executor.0) total-vm:72320kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 1217.780099][ T1043] oom_reaper: reaped process 3049 (syz-executor.0), now anon-rss:0kB, file-rss:33992kB, shmem-rss:0kB [ 1223.541899][ T373] device bridge_slave_1 left promiscuous mode [ 1223.555639][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 1223.656125][ T373] device bridge_slave_0 left promiscuous mode [ 1223.666587][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.412634][ T373] device hsr_slave_1 left promiscuous mode [ 1232.557854][ T373] device hsr_slave_0 left promiscuous mode [ 1232.799405][ T373] team0 (unregistering): Port device team_slave_1 removed [ 1232.844591][ T373] team0 (unregistering): Port device team_slave_0 removed [ 1232.899615][ T373] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1233.016778][ T373] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1233.247171][ T373] bond0 (unregistering): Released all slaves 00:57:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() sendmsg(r1, 0x0, 0x40) socket$kcm(0x11, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xbf) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000001e0081dc68b70f002189c60900000000000000000000010000000000000000", 0x23}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1a) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r4, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x8000000, r2, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x10) socket$kcm(0x11, 0x3, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r5, 0x0, 0x0) 00:57:26 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x80, 0x0) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000a40)='/cgroup^#)\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001d80)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001e00)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003440)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000003400)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) getresuid(0x0, &(0x7f0000000840), &(0x7f0000000640)) stat(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) getuid() getgid() getresuid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) r2 = creat(&(0x7f0000000580)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) unlink(&(0x7f0000000940)='./file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xd, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0xe, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0300001562c5d5844d6fa3653b"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 00:57:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0xfe80000000000000, @empty}}, 0x0, 0x0, 0x500, 0x0, 0x1000000000054}, 0x98) 00:57:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r1 = syz_open_dev$adsp(0x0, 0x1, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x9) add_key$user(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000580), 0x0, 0xfffffffffffffffa) sendto$inet(r0, &(0x7f0000000540)="a6", 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)="1b2f73ad4127595ed5be588b47420fa3c7e37878a0d0edc02c2ddce08c94fddd7ed3f950b971bc2b751c16d885976da648c2c3294c211b7b038db1a5241a5bb38af206c163c270c06cef43cddd846f1bcd822043e190dd1f40e64d998a1e1a6d17297f5b7907f446019b0bb495f8ef97d636318db1eb25a44fdb7d8d14fc6b6f6650e11e2a12be4fab45e5c933da483b6cdf814b92003f5bf7344e80c23e37770853b24b8cb86c923292938961d92811a54b51c2ccf5d6f21f59e84a2d5c939df3c968d293689075d4e2588fb1329e17fe", 0xd1, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:57:26 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x80, 0x0) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000a40)='/cgroup^#)\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001d80)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001e00)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003440)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000003400)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) getresuid(0x0, &(0x7f0000000840), &(0x7f0000000640)) stat(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) getuid() getgid() getresuid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) r2 = creat(&(0x7f0000000580)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) unlink(&(0x7f0000000940)='./file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xd, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0xe, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0300001562c5d5844d6fa3653b"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 00:57:26 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x80, 0x0) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000a40)='/cgroup^#)\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001d80)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001e00)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003440)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000003400)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) getresuid(0x0, &(0x7f0000000840), &(0x7f0000000640)) stat(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) getuid() getgid() getresuid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) r2 = creat(&(0x7f0000000580)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) unlink(&(0x7f0000000940)='./file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xd, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0xe, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0300001562c5d5844d6fa3653b"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 00:57:26 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x80, 0x0) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000a40)='/cgroup^#)\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001d80)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001e00)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003440)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000003400)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) getresuid(0x0, &(0x7f0000000840), &(0x7f0000000640)) stat(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) getuid() getgid() getresuid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) r2 = creat(&(0x7f0000000580)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) unlink(&(0x7f0000000940)='./file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xd, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0xe, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0300001562c5d5844d6fa3653b"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 00:57:26 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000540)='./file0\x00', 0x80, 0x0) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000a40)='/cgroup^#)\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001d80)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001e00)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003440)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000003400)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) getpgid(0x0) getresuid(0x0, &(0x7f0000000840), &(0x7f0000000640)) stat(&(0x7f00000036c0)='./file0\x00', &(0x7f0000003700)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) getuid() getgid() getresuid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) r2 = creat(&(0x7f0000000580)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, 0x0, 0x0) unlink(&(0x7f0000000940)='./file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xd, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0xe, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="ff0300001562c5d5844d6fa3653b"], 0x0, 0x0, 0x0}) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) 00:57:26 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000080a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 00:57:27 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x52}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/32, 0x20}], 0x1) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1265.091622][ T3104] IPVS: ftp: loaded support on port[0] = 21 [ 1265.483797][ T3106] IPVS: ftp: loaded support on port[0] = 21 [ 1266.319743][ T3104] chnl_net:caif_netlink_parms(): no params data found [ 1266.785480][ T21] device bridge_slave_1 left promiscuous mode [ 1266.801377][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.894998][ T21] device bridge_slave_0 left promiscuous mode [ 1266.911252][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 1272.681231][ T21] device hsr_slave_1 left promiscuous mode [ 1272.764471][ T21] device hsr_slave_0 left promiscuous mode [ 1272.836774][ T21] team0 (unregistering): Port device team_slave_1 removed [ 1272.878106][ T21] team0 (unregistering): Port device team_slave_0 removed [ 1272.913692][ T21] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1272.981085][ T21] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1273.182428][ T21] bond0 (unregistering): Released all slaves [ 1273.295390][ T3106] chnl_net:caif_netlink_parms(): no params data found [ 1273.320149][ T3104] bridge0: port 1(bridge_slave_0) entered blocking state [ 1273.341170][ T3104] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.349625][ T3104] device bridge_slave_0 entered promiscuous mode [ 1273.402930][ T3104] bridge0: port 2(bridge_slave_1) entered blocking state [ 1273.410107][ T3104] bridge0: port 2(bridge_slave_1) entered disabled state [ 1273.419408][ T3104] device bridge_slave_1 entered promiscuous mode [ 1273.536270][ T3106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1273.551187][ T3106] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.559458][ T3106] device bridge_slave_0 entered promiscuous mode [ 1273.590864][ T3104] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1273.632334][ T3106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1273.639523][ T3106] bridge0: port 2(bridge_slave_1) entered disabled state [ 1273.662036][ T3106] device bridge_slave_1 entered promiscuous mode [ 1273.682803][ T3104] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1273.769628][ T3106] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1273.793386][ T3104] team0: Port device team_slave_0 added [ 1273.801007][ T3104] team0: Port device team_slave_1 added [ 1273.847655][ T3106] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1273.900814][ T3106] team0: Port device team_slave_0 added [ 1274.023802][ T3104] device hsr_slave_0 entered promiscuous mode [ 1274.061421][ T3104] device hsr_slave_1 entered promiscuous mode [ 1274.122570][ T3106] team0: Port device team_slave_1 added [ 1274.145734][ T3104] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.152882][ T3104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1274.313933][ T3106] device hsr_slave_0 entered promiscuous mode [ 1274.351459][ T3106] device hsr_slave_1 entered promiscuous mode [ 1274.429847][ T3106] bridge0: port 2(bridge_slave_1) entered blocking state [ 1274.437485][ T3106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1274.445050][ T3106] bridge0: port 1(bridge_slave_0) entered blocking state [ 1274.452164][ T3106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1274.549848][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.573487][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1274.745988][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1274.895576][ T3104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1274.956538][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1274.981765][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1275.004413][ T3106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1275.036206][ T3104] 8021q: adding VLAN 0 to HW filter on device team0 [ 1275.072287][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1275.091560][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1275.131366][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.138742][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.185310][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1275.213753][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1275.237603][ T3106] 8021q: adding VLAN 0 to HW filter on device team0 [ 1275.270614][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1275.293850][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1275.326806][ T3686] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.333987][ T3686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.394148][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1275.427752][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1275.451865][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1275.507085][ T2989] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.514244][ T2989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1275.551438][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1275.591875][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1275.608209][ T2989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1275.647341][ T2989] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.654517][ T2989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1275.711663][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1275.735277][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1275.771977][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1275.812433][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1275.852306][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1275.882211][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1275.890917][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1275.969202][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1275.992796][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1276.021545][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1276.030031][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1276.071738][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1276.080770][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1276.122305][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1276.151702][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1276.159991][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1276.211738][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1276.220182][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1276.262028][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1276.270817][T28900] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1276.313824][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1276.338487][ T3106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1276.405663][ T3106] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1276.447009][ T3104] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1276.664333][ T3116] binder: 3115:3116 unknown command 1023 [ 1276.671538][ T3113] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 1276.689125][ T3116] binder: 3115:3116 ioctl c0306201 20000140 returned -22 [ 1276.702453][ T3113] CPU: 0 PID: 3113 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #92 [ 1276.710366][ T3113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1276.720527][ T3113] Call Trace: [ 1276.723954][ T3113] dump_stack+0x172/0x1f0 [ 1276.729354][ T3113] dump_header+0x10f/0xb6c [ 1276.733844][ T3113] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1276.739840][ T3113] ? ___ratelimit+0x60/0x595 [ 1276.744792][ T3113] ? do_raw_spin_unlock+0x57/0x270 [ 1276.749920][ T3113] oom_kill_process.cold+0x10/0x15 [ 1276.755063][ T3113] out_of_memory+0x79a/0x1280 [ 1276.759766][ T3113] ? __sched_text_start+0x8/0x8 [ 1276.764730][ T3113] ? oom_killer_disable+0x280/0x280 [ 1276.769954][ T3113] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1276.775512][ T3113] ? memcg_event_wake+0x230/0x230 [ 1276.780569][ T3113] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 1276.786587][ T3113] ? cgroup_file_notify+0x140/0x1b0 [ 1276.791903][ T3113] memory_max_write+0x169/0x300 [ 1276.796784][ T3113] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1276.802384][ T3113] ? mem_cgroup_write+0x360/0x360 [ 1276.807443][ T3113] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1276.813036][ T3113] cgroup_file_write+0x245/0x7a0 [ 1276.818003][ T3113] ? mem_cgroup_write+0x360/0x360 [ 1276.823073][ T3113] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1276.828919][ T3113] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 1276.834713][ T3113] kernfs_fop_write+0x2ba/0x480 [ 1276.839595][ T3113] __vfs_write+0x8d/0x110 [ 1276.844151][ T3113] ? kernfs_fop_open+0xd90/0xd90 [ 1276.851510][ T3113] vfs_write+0x20c/0x580 [ 1276.856161][ T3113] ksys_write+0x14f/0x2d0 [ 1276.860512][ T3113] ? __ia32_sys_read+0xb0/0xb0 [ 1276.865299][ T3113] ? do_syscall_64+0x26/0x610 [ 1276.870078][ T3113] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1276.876157][ T3113] ? do_syscall_64+0x26/0x610 [ 1276.880862][ T3113] __x64_sys_write+0x73/0xb0 [ 1276.885469][ T3113] do_syscall_64+0x103/0x610 [ 1276.890167][ T3113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1276.896096][ T3113] RIP: 0033:0x458da9 [ 1276.900004][ T3113] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1276.921153][ T3113] RSP: 002b:00007f8e684c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1276.929582][ T3113] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 1276.937575][ T3113] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1276.945585][ T3113] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1276.953865][ T3113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8e684c16d4 [ 1276.961854][ T3113] R13: 00000000004c880e R14: 00000000004def78 R15: 00000000ffffffff [ 1277.061335][ T3113] memory: usage 3532kB, limit 0kB, failcnt 59039 [ 1277.092343][ T3113] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1277.261265][ T3113] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1277.270761][ T3113] Memory cgroup stats for /syz1: cache:136KB rss:2248KB rss_huge:2048KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:2156KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1277.361282][T28900] binder: release 3115:3116 transaction 66 out, still active [ 1277.361326][ T3113] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=3112,uid=0 [ 1277.368725][T28900] binder: unexpected work type, 4, not freed [ 1277.368734][T28900] binder: undelivered TRANSACTION_COMPLETE [ 1277.415109][T28900] binder: send failed reply for transaction 66, target dead [ 1277.491227][ T3113] Memory cgroup out of memory: Killed process 3112 (syz-executor.1) total-vm:72452kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 1277.542915][ T1043] oom_reaper: reaped process 3112 (syz-executor.1), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB [ 1277.743173][ T3106] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 1277.782123][ T3106] CPU: 1 PID: 3106 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #92 [ 1277.790071][ T3106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.800625][ T3106] Call Trace: [ 1277.803927][ T3106] dump_stack+0x172/0x1f0 [ 1277.808267][ T3106] dump_header+0x10f/0xb6c [ 1277.812776][ T3106] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1277.818606][ T3106] ? ___ratelimit+0x60/0x595 [ 1277.823209][ T3106] ? do_raw_spin_unlock+0x57/0x270 [ 1277.828332][ T3106] oom_kill_process.cold+0x10/0x15 [ 1277.833450][ T3106] out_of_memory+0x79a/0x1280 [ 1277.838137][ T3106] ? lock_downgrade+0x880/0x880 [ 1277.842993][ T3106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1277.849247][ T3106] ? oom_killer_disable+0x280/0x280 [ 1277.854457][ T3106] ? find_held_lock+0x35/0x130 [ 1277.859247][ T3106] mem_cgroup_out_of_memory+0x1ca/0x230 [ 1277.865792][ T3106] ? memcg_event_wake+0x230/0x230 [ 1277.870855][ T3106] ? do_raw_spin_unlock+0x57/0x270 [ 1277.876071][ T3106] ? _raw_spin_unlock+0x2d/0x50 [ 1277.880932][ T3106] try_charge+0x102c/0x15c0 [ 1277.885448][ T3106] ? find_held_lock+0x35/0x130 [ 1277.890230][ T3106] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1277.895791][ T3106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1277.902084][ T3106] ? kasan_check_read+0x11/0x20 [ 1277.906954][ T3106] ? get_mem_cgroup_from_mm+0x128/0x2b0 [ 1277.912531][ T3106] mem_cgroup_try_charge+0x24d/0x5e0 [ 1277.917841][ T3106] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1277.923493][ T3106] wp_page_copy+0x408/0x1740 [ 1277.928093][ T3106] ? find_held_lock+0x35/0x130 [ 1277.932876][ T3106] ? pmd_pfn+0x1d0/0x1d0 [ 1277.937157][ T3106] ? lock_downgrade+0x880/0x880 [ 1277.942017][ T3106] ? swp_swapcount+0x540/0x540 [ 1277.946965][ T3106] ? kasan_check_read+0x11/0x20 [ 1277.951824][ T3106] ? do_raw_spin_unlock+0x57/0x270 [ 1277.956946][ T3106] do_wp_page+0x48e/0x1500 [ 1277.961374][ T3106] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 1277.966762][ T3106] __handle_mm_fault+0x22e8/0x3ec0 [ 1277.972006][ T3106] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1277.977567][ T3106] ? find_held_lock+0x35/0x130 [ 1277.982347][ T3106] ? handle_mm_fault+0x322/0xb30 [ 1277.987306][ T3106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1277.993645][ T3106] ? kasan_check_read+0x11/0x20 [ 1277.998606][ T3106] handle_mm_fault+0x43f/0xb30 [ 1278.003380][ T3106] __do_page_fault+0x5ef/0xda0 [ 1278.008156][ T3106] do_page_fault+0x71/0x581 [ 1278.012662][ T3106] ? page_fault+0x8/0x30 [ 1278.016932][ T3106] page_fault+0x1e/0x30 [ 1278.021085][ T3106] RIP: 0033:0x4032a2 [ 1278.025004][ T3106] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 49 85 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 f9 3a 05 00 48 [ 1278.044614][ T3106] RSP: 002b:00007ffe1bff3bb0 EFLAGS: 00010246 [ 1278.050780][ T3106] RAX: 0000000000000000 RBX: 0000000000137e1e RCX: 0000000000412a80 [ 1278.058762][ T3106] RDX: 000000000000000c RSI: 0000000000000002 RDI: 00007ffe1bff4ce0 [ 1278.066741][ T3106] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000000001276940 [ 1278.074719][ T3106] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe1bff4ce0 [ 1278.082702][ T3106] R13: 00007ffe1bff4cd0 R14: 0000000000000000 R15: 00007ffe1bff4ce0 [ 1278.291126][ T3106] memory: usage 1216kB, limit 0kB, failcnt 59051 [ 1278.297536][ T3106] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1278.337535][ T3106] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1278.356999][ T3106] Memory cgroup stats for /syz1: cache:136KB rss:136KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:36KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1278.412029][ T3106] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=3106,uid=0 [ 1278.452159][ T21] WARNING: CPU: 1 PID: 21 at net/xfrm/xfrm_policy.c:3873 xfrm_policy_fini+0x30c/0x3a0 [ 1278.462243][ T21] Kernel panic - not syncing: panic_on_warn set ... [ 1278.468841][ T21] CPU: 1 PID: 21 Comm: kworker/u4:1 Not tainted 5.1.0-rc7+ #92 [ 1278.471106][ T3106] Memory cgroup out of memory: Killed process 3106 (syz-executor.1) total-vm:72320kB, anon-rss:76kB, file-rss:34824kB, shmem-rss:0kB [ 1278.476379][ T21] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1278.500638][ T21] Workqueue: netns cleanup_net [ 1278.505431][ T21] Call Trace: [ 1278.508733][ T21] dump_stack+0x172/0x1f0 [ 1278.513074][ T21] ? xfrm_policy_fini+0x290/0x3a0 [ 1278.518191][ T21] panic+0x2cb/0x65c [ 1278.522106][ T21] ? __warn_printk+0xf3/0xf3 [ 1278.526735][ T21] ? xfrm_policy_fini+0x30c/0x3a0 [ 1278.531768][ T21] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1278.538021][ T21] ? __warn.cold+0x5/0x45 [ 1278.542361][ T21] ? __warn+0xe8/0x1d0 [ 1278.546534][ T21] ? xfrm_policy_fini+0x30c/0x3a0 [ 1278.551569][ T21] __warn.cold+0x20/0x45 [ 1278.555824][ T21] ? xfrm_policy_fini+0x30c/0x3a0 [ 1278.560950][ T21] report_bug+0x263/0x2b0 [ 1278.565369][ T21] do_error_trap+0x11b/0x200 [ 1278.569978][ T21] do_invalid_op+0x37/0x50 [ 1278.574400][ T21] ? xfrm_policy_fini+0x30c/0x3a0 [ 1278.579433][ T21] invalid_op+0x14/0x20 [ 1278.583598][ T21] RIP: 0010:xfrm_policy_fini+0x30c/0x3a0 [ 1278.589235][ T21] Code: c3 e8 58 ea 68 fb 0f 0b e9 49 fe ff ff e8 4c ea 68 fb 0f 0b e9 cd fd ff ff e8 40 ea 68 fb 0f 0b e9 00 ff ff ff e8 34 ea 68 fb <0f> 0b e9 62 fd ff ff e8 a8 00 a1 fb e9 7d fe ff ff 4c 89 ff e8 bb [ 1278.608843][ T21] RSP: 0018:ffff8880a99f7bb0 EFLAGS: 00010293 [ 1278.614913][ T21] RAX: ffff8880a99ea580 RBX: ffff8880666fdcf0 RCX: 1ffff1101533d5ce [ 1278.622892][ T21] RDX: 0000000000000000 RSI: ffffffff8607a27c RDI: ffff8880a99eadfc [ 1278.630887][ T21] RBP: ffff8880a99f7bf0 R08: ffff8880a99ea580 R09: ffff8880a99eae70 [ 1278.638967][ T21] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880666fc240 [ 1278.646942][ T21] R13: ffff8880a99f7cc8 R14: ffffffff893eaad8 R15: dffffc0000000000 [ 1278.654939][ T21] ? xfrm_policy_fini+0x30c/0x3a0 [ 1278.660061][ T21] ? xfrm_policy_fini+0x3a0/0x3a0 [ 1278.665113][ T21] xfrm_net_exit+0x1d/0x70 [ 1278.669570][ T21] ops_exit_list.isra.0+0xb0/0x160 [ 1278.674698][ T21] cleanup_net+0x3fb/0x960 [ 1278.679123][ T21] ? netns_install+0x1d0/0x1d0 [ 1278.683976][ T21] process_one_work+0x98e/0x1790 [ 1278.688934][ T21] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1278.694310][ T21] ? lock_acquire+0x16f/0x3f0 [ 1278.699025][ T21] worker_thread+0x98/0xe40 [ 1278.703613][ T21] kthread+0x357/0x430 [ 1278.707700][ T21] ? process_one_work+0x1790/0x1790 [ 1278.712918][ T21] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1278.719169][ T21] ret_from_fork+0x3a/0x50 [ 1278.725292][ T21] Kernel Offset: disabled [ 1278.730677][ T21] Rebooting in 86400 seconds..